Many people have asked me this question,"Why can’t we Create a Folder by name CON in Microsoft Windows or MS-DOS?"
Answer is quite simple. Because CON is a reserved word. Like CON, there are many other reserved words and every reserved word has got its own meaning to it. I have made a list of reserved words and their meanings. They are :-
CON - it stands for the “CONSOLE” I/O device (The display monitor).
PRN - It stands for printer. LPT1 is taken as default.
AUX - It stands for Auxiliary device.
COM0, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9 - They stands for serial ports.
LPT1, LPT2 - They stands for Parallel ports.
NUL - It stands for Bid Bucket.
Try creating a folder or file and name it with any of the keywords above. It will not work. The folder will remain named as "New folder" itself.
But you can achieve creating those folders through Command Prompt.
Just follow these instructions.
- Go to start -> Run -> cmd or command
- To create a folder named con in your C drive then, type this in the command prompt, md \\.\c:\con and hit Enter
- Similarly to create a folder named con in your D drive then, type this in the command prompt window down and press Enter, md \\.\d:\con and hit Enter
- Now you get the folder like this:
- If you want to delete this folder, type this in the command prompt, rd \\.\c:\con
- In place of con you can write any desired name of your folder as if for now you can even try folder names like prn, nul and many others too.
Filed Under :
Auxiliary device
,
COM1
,
Computer
,
CON
,
File
,
Folder
,
LPT1
,
Microsoft
,
Monitor
,
MS-DOS
,
NUL
,
Operating System
,
Parallel Port
,
Printer
,
PRN
,
Reserved words
,
Serial Port
,
Tips and Tricks
,
Windows
,
Windows XP
August 21, 2009
August 21, 2009
Bid Bucket = Bit Bucket
And 'Bit Bucket' is ...?
A "Bit Bucket" is a black hole. A void where you can pipe output from a command into "nul" and it won't be displayed but the data also doesn't go anywhere. These names are legacy, archaic names from the bad ol' MS-DOS days of yesteryear. Their only purpose these days seem to be to cause security vulnerabilities in modern software products.