====== Windows - CLI ======
===== Open CMD as System Account =====
[[https://technet.microsoft.com/en-us/sysinternals/bb897553.aspx|PsExec]] is required.
PsExec -s cmd
===== Check Remote NTP Server =====
The following command will contact the NTP server 192.0.2.1 and show you 5 samples by printing time and offset.
w32tm /stripchart /computer:192.0.2.1 /dataonly /samples:5
Example with output.
PS C:\> w32tm /stripchart /computer:192.0.2.1 /dataonly /samples:5
Tracking 192.0.2.1 [192.0.2.1:123].
Collecting 5 samples.
The current time is 18.04.2024 10:04:19.
10:04:19, -191.1682338s
10:04:21, -191.1659023s
10:04:23, -191.1665833s
10:04:25, -191.1664487s
10:04:27, -191.1664522s
===== Show Time Source =====
Show the current time source.
w32tm /query /status
Example: NTP time source with server 192.0.2.1.
PS C:\> w32tm /query /status
Leap Indicator: 0(no warning)
Stratum: 3 (secondary reference - syncd by (S)NTP)
Precision: -23 (119.209ns per tick)
Root Delay: 0.0133334s
Root Dispersion: 0.0289849s
ReferenceId: 0xC0A80101 (source IP: 192.0.2.1)
Last Successful Sync Time: 25.04.2024 19:12:36
Source: 192.0.2.1
Poll Interval: 10 (1024s)
===== Set NTP Servers =====
Set your NTP servers manually, separated by space if more than one.
w32tm /config /manualpeerlist:"192.0.2.1 192.0.2.2" /syncfromflags:manual /update
More information: [[https://learn.microsoft.com/en-us/windows-server/networking/windows-time-service/windows-time-service-tools-and-settings?tabs=config|learn.microsoft.com: Windows Time service tools and settings]]
===== Disable Recall =====
Dism /Online /Disable-Feature /Featurename:Recall
* [[https://wetdry.world/@winload_exe/113333567218950033|debunking discourse on machine learning (ML) features in Win11]]
* [[https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/enable-or-disable-windows-features-using-dism?view=windows-11|Enable or Disable Windows Features Using DISM]]
===== Show Error Messages =====
Interesting but useless, except you want to put it in AutoRun to troll people.
rundll32.exe ndfapi.dll, NdfRunDllDuplicateIPDefendingSystem
{{:os:windows:ndfrundllduplicateipdefendingsystem.png?direct|}}
rundll32.exe ndfapi.dll, NdfRunDllDuplicateIPOffendingSystem
{{:os:windows:ndfrundllduplicateipoffendingsystem.png?direct|}}
Source: [[https://x.com/Hexacorn/status/1847398142188134410|Twitter]]