This article is mainly about the project "personal computer use record removal Software" series of articles on the elimination of browser cookies, ie temporary files, recent use history, and so on. The basic idea of this article is to first learn about the history of the Internet in Windows common file path, The file Delete method is used to delete the contents of the file, but many files cannot be read; The final solution is to remove the caching functionality with
If you are in a small domain user's machine, to do some administrative operations, it is inevitable to use CMD to open some previously only in the graphical interface open programs. Here are some of the common actions I've collected.Start the program in an identity: runas/user:it\n176197 cmd//can also directly right-click the program to run, tap "Run as", if there is no "run as", hold down SHIFT and right-clickAssign Change permissions: cacls c:\sem/e/g everyone:cGet the owner of a file under Wi
File:19.exe
size:33495 bytes
File version:0.00.0204
Modified:2007 year December 29, 21:23:18
md5:4b2be9775b6ca847fb2547dd75025625
Sha1:2660f88591ad4da8849a3a56f357e7dfb9694d45
crc32:2a485241
Writing language: VB
1. After the virus runs, the following copies and documents are derived:
Quote:
%systemroot%\debug\debugprogram.exe
%systemroot%\system32\command.pif
%systemroot%\system32\dxdiag.com
%systemroot%\system32\finder.com
%systemroot%\system32\msconfig.com
%systemroot%\system32\regedit.com
Solution
method One: Release clear off the Clipboard
Caused "Unable to stop the universal volume device", generally there are reasons, such as the above mentioned reason is the most common, the solution can be released to clear off the Clipboard, you can casually copy anything on the hard drive to release the copy operation in the U disk. You will then find that you can remove the USB drive device normally.
Method Two: Use Task Manager to end a process
If you think the above method is stil
Control Panel
Module: control.exe
Command: Rundll32.exe shell32.dll,Control_RunDLL
Results: The Control Panel window is displayed.
Example:
Dim x
x = Shell ("rundll32.exe shell32.dll,Control_RunDLL")
Accessibility Options
Module: access.cpl
Command: rundll32.exe shell32.dll,Control_RunDLL access.cpl,,5
Results: Show secondary options/general.
Command:
Deep Analysis of JavaScript Backdoors
0x00 background
Previously, the article JavaScript backdoorof @ san mentioned how to use rundll32.exe to execute a JavaScript code to bounce an Http Shell. Here, I will share with you the article on the analysis of its principles.
Recently, hFireF0X published a detailed investigation of Win32/Poweeliks malware on the reverse engineering Forum kernelmode.info. This malicious software exists in the Windows Registra
Utility? Rundll32.exe? Introduction?
? ?
? ?
? Generally, the DLL code is loaded to the memory before it can be executed. How to execute the code exported from a DLL instead of creating, loading, and calling the code? DLL? ? EXE? What about files? The method is as follows: slave? Windows? 95? Start with each? Windows? The operating system version comes with a system utility: rundll32.exe. Can I use it to ex
Translated by Alex tilles in Windows Developer Network (Issue 1)
Article : "Writing your own install and uninstall Code ". This is an article with certain technical content. I believe many developers need the technology described in this article, including several important technical points:
Rundll32.exe
Program ;
DLL or EXE self-deletion technology;
Embedded resource processing skills;
Lzcopy API usage example;
Compress.exe,expand.exe ins
Here are 6 ways I've tested 6 cookies to clear WebBrowser: //method One: Call Wininet.dll to clear cookies (recommended)Suppresswininetbehavior (); //Method Two: Delete the user login information, this is equivalent to the browser logout function, using the features IE comes with (recommended)HTMLDocument document =WB. Document; Document. ExecCommand ("Clearauthenticationcache",false,NULL); //Method Three: Delete the native cookie This method pops up the pop-up box of IE cl
Back door! I believe this word will not be unfamiliar to you, it's harm otherwise, but as people's awareness of security gradually enhanced, coupled with anti-virus software, "strong support" so that the traditional backdoor can not hide themselves, any little bit of computer knowledge, all know "check port" "Look at the process" in order to find some " Clues. " So, the writer of the back door adjusted the idea in time, focus on the dynamic link library, that is, the back door into a DLL file, a
How to use:
1 Closing the browser
2 Executive Un3721.bat
3 Re-execution Un3721.reg
4 Reboot the computer, basically the rubbish is deleted
5 If there is a small amount, restart the computer into Safe mode operation, or look at the help note in the. bat file,
Un3721.bat
Copy Code code as follows:
REM Cut off all rogues, let us wait for the Internet spring ~_~
REM needs to be modified according to its own requirements (some people still think a rogue is good to keep *_*)
rem If you
Shell statement usage tips 1. Are you anxious to call the system "create shortcuts" Wizard to create shortcuts that VB does not support? Although you can call the fcreateshelllink function in vb5stkit. dll,
But it is designed for the installer. The default path of the shortcut always starts from the current user's "/Start Menu/programs", that is,
If your Windows 95 is attached to drive C, you cannot use the fcreateshelllink function to create a shortcut to drive D. Now, we will introduce you to
I don't know why, strange questions always appear on my computer.
This time, I found that right click on the computer properties did not respond.
Help
That means the interface can't be displayed.
Baidu for a long search, and finally a netizen to help. He provided the following order:
%windir%\system32\rundll32.exe shell32.dll,Control_RunDLL sysdm.cpl @1
In cmd input, sure enough to solve the open this interface. Baidu
other abnormal conditions occur, then repeat the method of step 5, the backup of the original system file back, if this situation, I'm sorry, your computer can not be converted into Media Center version, give up, If there is no problem after restarting, continue with the following steps;7. Copy the downloaded three installation information files to the C:\Windows\Inf\ folder, overwrite the original files, and then prepare the Windows XP Media Center Edition CD2 CD, if the ISO file is downloaded
hear it:
The DLL file cannot run independently, so no DLL is displayed in the process list. Suppose we have compiled a Trojan
DLL, and run it through other processes, no matter whether it is the intrusion detection software or the process list
The current process does not contain trojan dll. if the process is a trusted process (for example, resource manager explo
Rer.exe, no one will doubt that it is a trojan ?) Then, the DLL we compiled as part of that process will also
Become a trust
Control Program
SFC
System File Checker
Scannow
Windows File Protection
Tsshutdn
60 seconds countdown shutdown command
Tourstart
XP introduction (roaming XP program displayed after installation)
Taskmgr
Task Manager
Tasklist/svc
View process details
Eventvwr
Event Viewer
Eudcedit
Word Creation procedure
Explorer
Open "My Documents"
Packager
Object packaging Program
Pe
list of processes, assuming that we have written a Trojan DLL and run it through other processes, both the intrusion detection software and the process list will only show up that process without the Trojan DLL , if that process is a trusted process, such as the resource Manager Explorer.exe, no one will suspect it is a trojan, right? Then we write the DLL as part of that process and will become a trusted member and do whatever it takes.
The easiest way to run a DLL file is to take advantage o
the service, please do not delete it without permission.First, delete the serviceMethod One: Use sc.exe this Windows commandStart-run--cmd.exe and enter SC to see it. The way to use it is simple:SC Delete "service name" (if there is a space in the middle of the service name, it needs to be quoted), the service name can be found in the properties of the service, do not mistake the service name for the display name.As for the above: SC delete ksd2serviceMethod Two: Edit the Registry directlyOpen
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.