Detailed registry and system security

Source: Internet
Author: User

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

The Windows Registry is upgraded as the Windows operating system continues to update. The registry is the internal database of Windows, so it is self-evident that it is important, but you may not know that the security of the computer connected to the Internet will be rigorously tested. If not prevented, the computer's important information, documents and other information will be completely exposed. Therefore, how to prevent malicious attacks or damage, to ensure system security has become a topic of great concern.

Windows XP Registry

The Windows registry is an internal database that is a huge tree-like hierarchical database. It accommodates all configuration information for applications and computer systems, initialization information for systems and applications, association relationships between applications and document files, 11585.html "> Hardware device Descriptions, status and properties, and various state information and data." Various parameters are stored in the registry. Directly controls the startup of Windows, the loading of hardware drivers, and the operation of some Windows applications, which play a central role throughout the Windows system.

Type of virus attack registry

First, the registry Hkey-loca-machlne\soptwaremicrosoft\windowscurrentversionrun loading program, so that the boot automatically run. Like "RUN" start, runonce,runservices, etc.

Ii. some viruses that damage the system. This kind of virus constructs the subkey in the registry Hkey-local-machineservecesvxdd directory, and sets the key value to L '. Causes the system to automatically load the virus program after it is run.

Third, the virus by changing the way the file is opened, this allows the program to start with the type of file you open. In registry Hkey-classes-rootexefile\shell\open\command, the default value is: "%1 '%". For example, change this default value to (Trojan.exe "%1"%+). Each time the EXE file is run, the Trojan.exe file is executed.

This article originates from http://www.516c.cn reprint please specify the source!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.