SlideShare a Scribd company logo
1 of 2
@echo off
cls
:start
echo ============================================
echo 1. Notepad
echo 2. Calculator
echo 3. Snipping Tool
echo 4. Command Prompt
echo 5. Process Hacker
echo 6. On-Screen Keyboard
echo 7. Bank Mandiri
echo.
echo 8. Internet Explorer
echo 9. Mozilla Firefox
echo 10. Microsoft Outlook
echo 11. Internet Download Manager
echo.
echo 12. Daily Report
echo.
echo 13. Keluar
echo.
set /p pilihan=pilih yang akan dibuka:
IF '%pilihan%' == '%pilihan%' GOTO Item_%pilihan%
:Item_1
start /MIN /DC:WindowsSystem32 notepad.exe
GOTO Start
:Item_2
start /MIN /DC:WindowsSystem32 calc.exe
GOTO Start
:Item_3
start /MIN /DC:WindowsSystem32 SnippingTool.exe
GOTO Start
:Item_4
start /MIN /DC:WindowsSystem32 cmd.exe
GOTO Start
:Item_5
start /MIN /D"C:UsersUserDesktop" ProcessHacker.exe
GOTO Start
:Item_6
start /MIN /DC:WindowsSystem32 osk.exe
GOTO Start
:Item_7
start /MIN /D"C:Program Files (x86)Mozilla Firefoxfirefox.exe"
http://www.bankmandiri.co.id
GOTO Start
:Item_8
start /MIN /D"C:Program Files (x86)Internet Explorer" iexplore.exe
GOTO Start
:Item_9
start /MIN /D"C:Program Files (x86)Mozilla Firefox" firefox.exe
GOTO Start
:Item_10
start /MIN /D"C:Program Files (x86)Microsoft OfficeOffice14" OUTLOOK.EXE
GOTO Start
:Item_11
start /MIN /D"C:Program Files (x86)Internet Download Manager" IDMan.exe
GOTO Start
:Item_12
D:
cd Documents
"Daily Report Mei (Maulana Kurniantoro).xlsx"
GOTO Start
:Item_13
exit

More Related Content

What's hot

Remove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virusRemove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virusjesicasruma
 
Step By Step Process To Remove Search-goal.com
Step By Step Process To Remove Search-goal.comStep By Step Process To Remove Search-goal.com
Step By Step Process To Remove Search-goal.comandreswright576
 
How To Remove Browser Hijacker
How To Remove Browser HijackerHow To Remove Browser Hijacker
How To Remove Browser HijackerSean Doyal
 
How to remove mystartsearch.com virus manually
How to remove mystartsearch.com virus manuallyHow to remove mystartsearch.com virus manually
How to remove mystartsearch.com virus manuallyharoNaroum
 
Inaccessible boot device error in windows 10
Inaccessible boot device error in windows 10Inaccessible boot device error in windows 10
Inaccessible boot device error in windows 10scarlet christer
 

What's hot (7)

Remove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virusRemove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virus
 
How To Prevent Virus Part1
How To Prevent Virus Part1How To Prevent Virus Part1
How To Prevent Virus Part1
 
Step By Step Process To Remove Search-goal.com
Step By Step Process To Remove Search-goal.comStep By Step Process To Remove Search-goal.com
Step By Step Process To Remove Search-goal.com
 
How To Remove Browser Hijacker
How To Remove Browser HijackerHow To Remove Browser Hijacker
How To Remove Browser Hijacker
 
How to remove mystartsearch.com virus manually
How to remove mystartsearch.com virus manuallyHow to remove mystartsearch.com virus manually
How to remove mystartsearch.com virus manually
 
Inaccessible boot device error in windows 10
Inaccessible boot device error in windows 10Inaccessible boot device error in windows 10
Inaccessible boot device error in windows 10
 
Example esb flow
Example esb flowExample esb flow
Example esb flow
 

Similar to contoh Shortcut dot batch

Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingDan Morrill
 
McAfee_Causes_Computer_To_Hang
McAfee_Causes_Computer_To_HangMcAfee_Causes_Computer_To_Hang
McAfee_Causes_Computer_To_HangEric Roberson
 
Windows defender scheduled scan set up in windows 8
Windows defender scheduled scan   set up in windows 8Windows defender scheduled scan   set up in windows 8
Windows defender scheduled scan set up in windows 8Trường Tiền
 
Rooted 2010 ppp
Rooted 2010 pppRooted 2010 ppp
Rooted 2010 pppnoc_313
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricksSudhanshu Mishra
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityIOSR Journals
 
Monit - NHRuby May 2009
Monit - NHRuby May 2009Monit - NHRuby May 2009
Monit - NHRuby May 2009bturnbull
 
Troubleshooting Plone
Troubleshooting PloneTroubleshooting Plone
Troubleshooting PloneRicado Alves
 
Practical JavaScript Programming - Session 8/8
Practical JavaScript Programming - Session 8/8Practical JavaScript Programming - Session 8/8
Practical JavaScript Programming - Session 8/8Wilson Su
 
It troubleshooting - Arthur B
It troubleshooting - Arthur BIt troubleshooting - Arthur B
It troubleshooting - Arthur Basberg1997
 
Penetration Testing for Easy RM to MP3 Converter Application and Post Exploit
Penetration Testing for Easy RM to MP3 Converter Application and Post ExploitPenetration Testing for Easy RM to MP3 Converter Application and Post Exploit
Penetration Testing for Easy RM to MP3 Converter Application and Post ExploitJongWon Kim
 
How to remove password if you forgot windows 7 password apps for windows
How to remove password if you forgot windows 7 password   apps for windowsHow to remove password if you forgot windows 7 password   apps for windows
How to remove password if you forgot windows 7 password apps for windowsRaj Kamal Choudhary
 
Optimize your computer for peak performance
Optimize your computer for peak performanceOptimize your computer for peak performance
Optimize your computer for peak performancepacampbell
 
JNTUA IT Workshop Lab presentation - PPT.pdf
JNTUA IT Workshop Lab presentation - PPT.pdfJNTUA IT Workshop Lab presentation - PPT.pdf
JNTUA IT Workshop Lab presentation - PPT.pdftejaswiniprathapanen
 

Similar to contoh Shortcut dot batch (20)

Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scripting
 
Cooking with Chef
Cooking with ChefCooking with Chef
Cooking with Chef
 
McAfee_Causes_Computer_To_Hang
McAfee_Causes_Computer_To_HangMcAfee_Causes_Computer_To_Hang
McAfee_Causes_Computer_To_Hang
 
It Works On Dev
It Works On DevIt Works On Dev
It Works On Dev
 
Windows defender scheduled scan set up in windows 8
Windows defender scheduled scan   set up in windows 8Windows defender scheduled scan   set up in windows 8
Windows defender scheduled scan set up in windows 8
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Rooted 2010 ppp
Rooted 2010 pppRooted 2010 ppp
Rooted 2010 ppp
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Fun with Ruby and Cocoa
Fun with Ruby and CocoaFun with Ruby and Cocoa
Fun with Ruby and Cocoa
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricks
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utility
 
Monit - NHRuby May 2009
Monit - NHRuby May 2009Monit - NHRuby May 2009
Monit - NHRuby May 2009
 
Troubleshooting Plone
Troubleshooting PloneTroubleshooting Plone
Troubleshooting Plone
 
Practical JavaScript Programming - Session 8/8
Practical JavaScript Programming - Session 8/8Practical JavaScript Programming - Session 8/8
Practical JavaScript Programming - Session 8/8
 
It troubleshooting - Arthur B
It troubleshooting - Arthur BIt troubleshooting - Arthur B
It troubleshooting - Arthur B
 
Penetration Testing for Easy RM to MP3 Converter Application and Post Exploit
Penetration Testing for Easy RM to MP3 Converter Application and Post ExploitPenetration Testing for Easy RM to MP3 Converter Application and Post Exploit
Penetration Testing for Easy RM to MP3 Converter Application and Post Exploit
 
How to remove password if you forgot windows 7 password apps for windows
How to remove password if you forgot windows 7 password   apps for windowsHow to remove password if you forgot windows 7 password   apps for windows
How to remove password if you forgot windows 7 password apps for windows
 
Optimize your computer for peak performance
Optimize your computer for peak performanceOptimize your computer for peak performance
Optimize your computer for peak performance
 
JNTUA IT Workshop Lab presentation - PPT.pdf
JNTUA IT Workshop Lab presentation - PPT.pdfJNTUA IT Workshop Lab presentation - PPT.pdf
JNTUA IT Workshop Lab presentation - PPT.pdf
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

contoh Shortcut dot batch

  • 1. @echo off cls :start echo ============================================ echo 1. Notepad echo 2. Calculator echo 3. Snipping Tool echo 4. Command Prompt echo 5. Process Hacker echo 6. On-Screen Keyboard echo 7. Bank Mandiri echo. echo 8. Internet Explorer echo 9. Mozilla Firefox echo 10. Microsoft Outlook echo 11. Internet Download Manager echo. echo 12. Daily Report echo. echo 13. Keluar echo. set /p pilihan=pilih yang akan dibuka: IF '%pilihan%' == '%pilihan%' GOTO Item_%pilihan% :Item_1 start /MIN /DC:WindowsSystem32 notepad.exe GOTO Start :Item_2 start /MIN /DC:WindowsSystem32 calc.exe GOTO Start :Item_3 start /MIN /DC:WindowsSystem32 SnippingTool.exe GOTO Start :Item_4 start /MIN /DC:WindowsSystem32 cmd.exe GOTO Start :Item_5 start /MIN /D"C:UsersUserDesktop" ProcessHacker.exe GOTO Start :Item_6 start /MIN /DC:WindowsSystem32 osk.exe GOTO Start :Item_7 start /MIN /D"C:Program Files (x86)Mozilla Firefoxfirefox.exe" http://www.bankmandiri.co.id GOTO Start :Item_8 start /MIN /D"C:Program Files (x86)Internet Explorer" iexplore.exe GOTO Start :Item_9 start /MIN /D"C:Program Files (x86)Mozilla Firefox" firefox.exe GOTO Start :Item_10 start /MIN /D"C:Program Files (x86)Microsoft OfficeOffice14" OUTLOOK.EXE
  • 2. GOTO Start :Item_11 start /MIN /D"C:Program Files (x86)Internet Download Manager" IDMan.exe GOTO Start :Item_12 D: cd Documents "Daily Report Mei (Maulana Kurniantoro).xlsx" GOTO Start :Item_13 exit