• The REM Command
  • ECHO
  • The PAUSE Command
  • Parameters
  • SHIFT: Infinite Parameters
  • THE FOR LOOP
  • IF: CONDITIONAL BRANCHING
  • IF NOT EXIST FILENAME Command
  • Comparing Strings to Validate Parameters
  • The CHOICE Command
  • Redirecting Input
  • MORE
  • PIPING
  • Making your own Syslog Daemon
  • ASSOCIATING THE FILES TO BE MONITORED TO THE LOGGER
  • Creating the Log File
  • CODING THE LOGGING BATCH FILE
  • Enhancing the logging Batch file to escape the eyes of the Lamer.
  • MAKING YOUR OWN DEADLY BATCH FILE VIRUS
  • Protection from Batch File Viruses
  • TL;DR