Ok now I went though the XP pro version and looked at some cool new things. I'm not sure that NT has these or even win2000 but I'm going to post these to let you know that their there. All of these are accessed through the command prompt, so all you have to do is open it up and type these commands. If your computer says can't find it because it's not there. There is a list of menu's to.

1)nslookup-lookups host
2)pathping-
Usage: pathping [-g host-list] [-h maximum_hops] [-i address] [-n]
[-p period] [-q num_queries] [-w timeout] [-P] [-R] [-T]
[-4] [-6] target_name

Options:
-g host-list Loose source route along host-list.
-h maximum_hops Maximum number of hops to search for target.
-i address Use the specified source address.
-n Do not resolve addresses to hostnames.
-p period Wait period milliseconds between pings.
-q num_queries Number of queries per hop.
-w timeout Wait timeout milliseconds for each reply.
-P Test for RSVP PATH connectivity.
-R Test if each hop is RSVP aware.
-T Test connectivity to each hop with Layer-2 priority tags.
-4 Force using IPv4.
-6 Force using IPv6.


3)ping6-

Usage: ping6 [-t] [-a] [-n count] [-l size] [-w timeout] [-s srcaddr] [-r] dest

Options:
-t Ping the specifed host until interrupted.
-a Resolve addresses to hostnames.
-n count Number of echo requests to send.
-l size Send buffer size.
-w timeout Timeout in milliseconds to wait for each reply.
-s srcaddr Source address to use.
-r Use routing header to test reverse route also.


4)shutdown (this one allows you to shut down a remote machine, or do a restart but only works if you are connected dirrrr)
-m \\computername
Remote computer to shutdown/restart/abort

5)tftp-

Transfers files to and from a remote computer running the TFTP service.

TFTP [-i] host [GET | PUT] source [destination]

-i Specifies binary image transfer mode (also called
octet). In binary image mode the file is moved
literally, byte by byte. Use this mode when
transferring binary files.
host Specifies the local or remote host.
GET Transfers the file destination on the remote host to
the file source on the local host.
PUT Transfers the file source on the local host to
the file destination on the remote host.
source Specifies the file to transfer.
destination Specifies where to transfer the file.


6)tracert6-

Usage: tracert6 [-d] [-h maximum_hops] [-w timeout] [-s srcaddr] target_name

Options:
-d Do not resolve addresses to hostnames.
-h max_hops Maximum number of hops to search for target.
-w timeout Wait timeout milliseconds for each reply.
-s srcaddr Source address to use.
-r Use routing header to test reverse route also.



7)finger-
Displays information about a user on a specified system running the
Finger service. Output varies based on the remote system.

FINGER [-l] [user]@host [...]

-l Displays information in long list format.
user Specifies the user you want information about. Omit the user
parameter to display information about all users on the
specifed host.
@host Specifies the server on the remote system whose users you
want information about.



9)arp-ok this one is really long but it has lots of things for example it allows a hacker to identify how many computers are on the network and identify every IP on that network. It can specify internet addresses. Also displays the arp entries.

I'm sure there are more but all of these commands are spelled right. Have fun, besides you should know what hackers know.
So for all the linux users what do you think of that...lol, just joking.
Well the other commands are the originals nbtstat, nestat, ping, telnet, tracert, so hope it helps any questions let me know.