Vista
•  Greatis •  Security •  AppDatabase •  Utilities •  Delphi/CB •  Visual Basic • .NET •  Outsourcing
 
 
Hot offer
Newsletters
Subscribe to our news!    Subscribe to our news!
Home Download Order Support   Newsletter ?
 xcopy.exe - Utilities - Vista

We recommend! Click Here to Update All your PC's Outdated drivers
xcopy.exe

xcopy.exe is a part of Windows Vista.

Relate to: File system, Console, Programming

Default location: %WinDir%\System32\xcopy.exe

Useful information about: xcopy.exe

Description: Extended Copy Utility

Version: 6.0.6000.16386 (vista_rtm.061101-2205)

Size: 36352 (35K)

MD5: 1E095E085205CDF3BF0F8766E74954F5

Xcopy.exe is used for coping files and directory trees.

NOTE: Xcopy is now deprecated, please use Robocopy.

Usage:

XCOPY source [destination] [/A | /M] [/D[: date]] [/P] [/S [/E]] [/V] [/W]

[/C] [/I] [/Q] [/F] [/L] [/G] [/H] [/R] [/T] [/U]

[/K] [/N] [/O] [/X] [/Y] [/-Y] [/Z] [/B]

[/EXCLUDE: file1[+file2][+file3]...]

source Specifies the file(s) to copy.

destination Specifies the location and/or name of new files.

/A Copies only files with the archive attribute set,

doesn't change the attribute.

/M Copies only files with the archive attribute set,

turns off the archive attribute.

/D: m-d-y Copies files changed on or after the specified date.

If no date is given, copies only those files whose

source time is newer than the destination time.

/EXCLUDE: file1[+file2][+file3]...

Specifies a list of files containing strings. Each string

should be in a separate line in the files. When any of the

strings match any part of the absolute path of the file to be

copied, that file will be excluded from being copied. For

example, specifying a string like \obj\ or .obj will exclude

all files underneath the directory obj or all files with the

.obj extension respectively.

/P Prompts you before creating each destination file.

/S Copies directories and subdirectories except empty ones.

/E Copies directories and subdirectories, including empty ones.

Same as /S /E. May be used to modify /T.

/V Verifies the size of each new file.

/W Prompts you to press a key before copying.

/C Continues copying even if errors occur.

/I If destination does not exist and copying more than one file,

assumes that destination must be a directory.

/Q Does not display file names while copying.

/F Displays full source and destination file names while copying.

/L Displays files that would be copied.

/G Allows the copying of encrypted files to destination that does

not support encryption.

/H Copies hidden and system files also.

/R Overwrites read-only files.

/T Creates directory structure, but does not copy files. Does not

include empty directories or subdirectories. /T /E includes

empty directories and subdirectories.

/U Copies only files that already exist in destination.

/K Copies attributes. Normal Xcopy will reset read-only attributes.

/N Copies using the generated short names.

/O Copies file ownership and ACL information.

/X Copies file audit settings (implies /O).

/Y Suppresses prompting to confirm you want to overwrite an

existing destination file.

/-Y Causes prompting to confirm you want to overwrite an

existing destination file.

/Z Copies networked files in restartable mode.

/B Copies the Symbolic Link itself versus the target of the link

The switch /Y may be preset in the COPYCMD environment variable.

This may be overridden with /-Y on the command line.

Slow computer? Speed up your Windows boot process with Startup Optimizer
Try RegRun Suite for free. It helps...


Constantly updated. Last update: October 13 2008


Would you like to add your opinion?

Your Name (Not Required):

Your E-mail to contact (Not Required):

Application Name:

Application Status:
Neccessary
At your option
Useless
Dangerous

Description:

More info:
Quick Links
What's new?

RSS Feed

Ask Experts

Join forum

Links


Greatis Software Greatis | Security | AppDatabase | Utilities | Delphi/CB | Visual Basic | .NET | Outsourcing

Contacts | Add to Favorites | Recommend to a Friend | Privacy Policy | Copyright © 1998-2007 Greatis Software

eXTReMe Tracker