Submit Search
Upload
contoh Shortcut dot batch
•
Download as TXT, PDF
•
0 likes
•
200 views
Maulana Kurniantoro
Follow
contoh shortcut format batch
Read less
Read more
Technology
Report
Share
Report
Share
1 of 2
Download now
Recommended
Manually remove luckysearches.com virus
Manually remove luckysearches.com virus
haroNaroum
Fake start button on Windows8
Fake start button on Windows8
Tinydile
Forgot windows 10 laptop password? How to unlock?
Forgot windows 10 laptop password? How to unlock?
kolden
Select * from internet
Select * from internet
markandey
How to Remove adultcameras.info Pop-up
How to Remove adultcameras.info Pop-up
Adoniscooper
Windows 10: How to reset default settings
Windows 10: How to reset default settings
Xoom Telecom
How to Delete plus network.com
How to Delete plus network.com
mariagoel7
Optix Pro Bo2 K Trojan
Optix Pro Bo2 K Trojan
Shinra
Recommended
Manually remove luckysearches.com virus
Manually remove luckysearches.com virus
haroNaroum
Fake start button on Windows8
Fake start button on Windows8
Tinydile
Forgot windows 10 laptop password? How to unlock?
Forgot windows 10 laptop password? How to unlock?
kolden
Select * from internet
Select * from internet
markandey
How to Remove adultcameras.info Pop-up
How to Remove adultcameras.info Pop-up
Adoniscooper
Windows 10: How to reset default settings
Windows 10: How to reset default settings
Xoom Telecom
How to Delete plus network.com
How to Delete plus network.com
mariagoel7
Optix Pro Bo2 K Trojan
Optix Pro Bo2 K Trojan
Shinra
Remove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virus
jesicasruma
How To Prevent Virus Part1
How To Prevent Virus Part1
Politeknik Transkrian
Step By Step Process To Remove Search-goal.com
Step By Step Process To Remove Search-goal.com
andreswright576
How To Remove Browser Hijacker
How To Remove Browser Hijacker
Sean Doyal
How to remove mystartsearch.com virus manually
How to remove mystartsearch.com virus manually
haroNaroum
Inaccessible boot device error in windows 10
Inaccessible boot device error in windows 10
scarlet christer
Example esb flow
Example esb flow
Antonio Pellegrino
Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scripting
Dan Morrill
Cooking with Chef
Cooking with Chef
Orlando_Ruby_Users_Group
McAfee_Causes_Computer_To_Hang
McAfee_Causes_Computer_To_Hang
Eric Roberson
It Works On Dev
It Works On Dev
marcelesser
Windows defender scheduled scan set up in windows 8
Windows defender scheduled scan set up in windows 8
Trường Tiền
5 stepmainttut
5 stepmainttut
ajay_mane22
Computer maintenance
Computer maintenance
Celia Bandelier
Rooted 2010 ppp
Rooted 2010 ppp
noc_313
Computer maintenance
Computer maintenance
Johndion Ruloma
Fun with Ruby and Cocoa
Fun with Ruby and Cocoa
Patrick Huesler
Learn awesome hacking tricks
Learn awesome hacking tricks
Sudhanshu Mishra
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utility
IOSR Journals
Monit - NHRuby May 2009
Monit - NHRuby May 2009
bturnbull
Troubleshooting Plone
Troubleshooting Plone
Ricado Alves
Practical JavaScript Programming - Session 8/8
Practical JavaScript Programming - Session 8/8
Wilson Su
More Related Content
What's hot
Remove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virus
jesicasruma
How To Prevent Virus Part1
How To Prevent Virus Part1
Politeknik Transkrian
Step By Step Process To Remove Search-goal.com
Step By Step Process To Remove Search-goal.com
andreswright576
How To Remove Browser Hijacker
How To Remove Browser Hijacker
Sean Doyal
How to remove mystartsearch.com virus manually
How to remove mystartsearch.com virus manually
haroNaroum
Inaccessible boot device error in windows 10
Inaccessible boot device error in windows 10
scarlet christer
Example esb flow
Example esb flow
Antonio Pellegrino
What's hot
(7)
Remove search.portsayd.com redirect virus
Remove search.portsayd.com redirect virus
How To Prevent Virus Part1
How To Prevent Virus Part1
Step By Step Process To Remove Search-goal.com
Step By Step Process To Remove Search-goal.com
How To Remove Browser Hijacker
How To Remove Browser Hijacker
How to remove mystartsearch.com virus manually
How to remove mystartsearch.com virus manually
Inaccessible boot device error in windows 10
Inaccessible boot device error in windows 10
Example esb flow
Example esb flow
Similar to contoh Shortcut dot batch
Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scripting
Dan Morrill
Cooking with Chef
Cooking with Chef
Orlando_Ruby_Users_Group
McAfee_Causes_Computer_To_Hang
McAfee_Causes_Computer_To_Hang
Eric Roberson
It Works On Dev
It Works On Dev
marcelesser
Windows defender scheduled scan set up in windows 8
Windows defender scheduled scan set up in windows 8
Trường Tiền
5 stepmainttut
5 stepmainttut
ajay_mane22
Computer maintenance
Computer maintenance
Celia Bandelier
Rooted 2010 ppp
Rooted 2010 ppp
noc_313
Computer maintenance
Computer maintenance
Johndion Ruloma
Fun with Ruby and Cocoa
Fun with Ruby and Cocoa
Patrick Huesler
Learn awesome hacking tricks
Learn awesome hacking tricks
Sudhanshu Mishra
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utility
IOSR Journals
Monit - NHRuby May 2009
Monit - NHRuby May 2009
bturnbull
Troubleshooting Plone
Troubleshooting Plone
Ricado Alves
Practical JavaScript Programming - Session 8/8
Practical JavaScript Programming - Session 8/8
Wilson Su
It troubleshooting - Arthur B
It troubleshooting - Arthur B
asberg1997
Penetration Testing for Easy RM to MP3 Converter Application and Post Exploit
Penetration Testing for Easy RM to MP3 Converter Application and Post Exploit
JongWon Kim
How to remove password if you forgot windows 7 password apps for windows
How to remove password if you forgot windows 7 password apps for windows
Raj Kamal Choudhary
Optimize your computer for peak performance
Optimize your computer for peak performance
pacampbell
JNTUA IT Workshop Lab presentation - PPT.pdf
JNTUA IT Workshop Lab presentation - PPT.pdf
tejaswiniprathapanen
Similar to contoh Shortcut dot batch
(20)
Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scripting
Cooking with Chef
Cooking with Chef
McAfee_Causes_Computer_To_Hang
McAfee_Causes_Computer_To_Hang
It Works On Dev
It Works On Dev
Windows defender scheduled scan set up in windows 8
Windows defender scheduled scan set up in windows 8
5 stepmainttut
5 stepmainttut
Computer maintenance
Computer maintenance
Rooted 2010 ppp
Rooted 2010 ppp
Computer maintenance
Computer maintenance
Fun with Ruby and Cocoa
Fun with Ruby and Cocoa
Learn awesome hacking tricks
Learn awesome hacking tricks
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utility
Monit - NHRuby May 2009
Monit - NHRuby May 2009
Troubleshooting Plone
Troubleshooting Plone
Practical JavaScript Programming - Session 8/8
Practical JavaScript Programming - Session 8/8
It troubleshooting - Arthur B
It troubleshooting - Arthur B
Penetration Testing for Easy RM to MP3 Converter Application and Post Exploit
Penetration Testing for Easy RM to MP3 Converter Application and Post Exploit
How to remove password if you forgot windows 7 password apps for windows
How to remove password if you forgot windows 7 password apps for windows
Optimize your computer for peak performance
Optimize your computer for peak performance
JNTUA IT Workshop Lab presentation - PPT.pdf
JNTUA IT Workshop Lab presentation - PPT.pdf
Recently uploaded
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
Recently uploaded
(20)
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
contoh Shortcut dot batch
1.
@echo off cls :start echo ============================================ echo
1. Notepad echo 2. Calculator echo 3. Snipping Tool echo 4. Command Prompt echo 5. Process Hacker echo 6. On-Screen Keyboard echo 7. Bank Mandiri echo. echo 8. Internet Explorer echo 9. Mozilla Firefox echo 10. Microsoft Outlook echo 11. Internet Download Manager echo. echo 12. Daily Report echo. echo 13. Keluar echo. set /p pilihan=pilih yang akan dibuka: IF '%pilihan%' == '%pilihan%' GOTO Item_%pilihan% :Item_1 start /MIN /DC:WindowsSystem32 notepad.exe GOTO Start :Item_2 start /MIN /DC:WindowsSystem32 calc.exe GOTO Start :Item_3 start /MIN /DC:WindowsSystem32 SnippingTool.exe GOTO Start :Item_4 start /MIN /DC:WindowsSystem32 cmd.exe GOTO Start :Item_5 start /MIN /D"C:UsersUserDesktop" ProcessHacker.exe GOTO Start :Item_6 start /MIN /DC:WindowsSystem32 osk.exe GOTO Start :Item_7 start /MIN /D"C:Program Files (x86)Mozilla Firefoxfirefox.exe" http://www.bankmandiri.co.id GOTO Start :Item_8 start /MIN /D"C:Program Files (x86)Internet Explorer" iexplore.exe GOTO Start :Item_9 start /MIN /D"C:Program Files (x86)Mozilla Firefox" firefox.exe GOTO Start :Item_10 start /MIN /D"C:Program Files (x86)Microsoft OfficeOffice14" OUTLOOK.EXE
2.
GOTO Start :Item_11 start /MIN
/D"C:Program Files (x86)Internet Download Manager" IDMan.exe GOTO Start :Item_12 D: cd Documents "Daily Report Mei (Maulana Kurniantoro).xlsx" GOTO Start :Item_13 exit
Download now