Index: /trunk/src/VBox/Runtime/common/fs/RTFsCmdLs.cpp
===================================================================
--- /trunk/src/VBox/Runtime/common/fs/RTFsCmdLs.cpp	(revision 85873)
+++ /trunk/src/VBox/Runtime/common/fs/RTFsCmdLs.cpp	(revision 85874)
@@ -1392,5 +1392,4 @@
 RTR3DECL(RTEXITCODE) RTFsCmdLs(unsigned cArgs, char **papszArgs)
 {
-
     /*
      * Parse the command line.
@@ -1819,9 +1818,24 @@
 
             case '?':
-                RTPrintf("Usage: to be written\nOpts.on dump:\n");
+            {
+                RTPrintf("Usage: to be written\n"
+                         "Options dump:\n");
                 for (unsigned i = 0; i < RT_ELEMENTS(s_aOptions); i++)
-                    RTPrintf(" -%c,%s\n", s_aOptions[i].iShort, s_aOptions[i].pszLong);
+                    if (s_aOptions[i].iShort < 127 && s_aOptions[i].iShort >= 0x20)
+                        RTPrintf(" -%c,%s\n", s_aOptions[i].iShort, s_aOptions[i].pszLong);
+                    else
+                        RTPrintf(" %s\n", s_aOptions[i].pszLong);
+#ifdef RT_OS_WINDOWS
+                const char *pszProgNm = RTPathFilename(papszArgs[0]);
+                RTPrintf("\n"
+                         "The path prefix '\\\\:iprtnt:\\' can be used to access the NT namespace.\n"
+                         "To list devices:              %s -la \\\\:iprtnt:\\Device\n"
+                         "To list win32 devices:        %s -la \\\\:iprtnt:\\GLOBAL??\n"
+                         "To list the root (hack/bug):  %s -la \\\\:iprtnt:\\\n",
+                         pszProgNm, pszProgNm, pszProgNm);
+#endif
                 Assert(!Opts.papCollections);
                 return RTEXITCODE_SUCCESS;
+            }
 
             case 'V':
