\ Windows \ tmail.exe-service "SMS"# MMS \ Windows \ tmail.exe-service "MMS"# Email \ Windows \ tmail.exe-service "ActiveSync"# Task \ Windows \ poutlook.exe tasks# Calendar \ Windows \ calendar.exe# Notes \ Windows \ notes.exe# Contact \ Windows \ poutlook.exe contacts# Create an SMS \ Windows \ tmail.exe-transport "SMS"-""# Create a MMS \ Windows \ tmail.exe-service "MMS"-""# Create an email \ Windows \ tmail.exe-service "ActiveSync"-""# Create a contact: MSCONTACTS-new# Create a task: MSTASK
Interrupt Descriptor Descriptor Register instruction: SIDT DSTSimilar to "Sgdt DST".b) Storage machine status word directive: SMSW DSTDST can be a 16-bit universal register or storage unit. No effect on the flag bit.Note: In order to be compatible with the 80286 instruction set (386 CR0 low byte equals 286 machine state word), in 386, the storage machine word should use the stored CR0 Register instruction.2) Real mode and privilege level 0 executable commandsKey register settings directives, et
AVI downloaded by IE.
256 of AVI resources in C: WINDOWSsystem32SHDOCVW. DLL
※Resource Manager/IE toolbar button modification ※
Replace the toolbar buttons of IE and explorer with the shell32.dll bitmap 204--217.
On the IE corner, the image is replaced by the bitmap 240-242 in shell32.dll.
※Modification to the shutdown/logout dialog box ※
The most frequently asked questions are the shutdown and logout dialog boxes.
Shutdown is msgina. dll,
Log out as shell32.dll.
※Modification to the Windo
people have asked about AVI downloaded by IE. 256 of AVI resources in C: WINDOWSsystem32SHDOCVW. DLL ※Resource Manager/IE toolbar button modification ※ Replace the toolbar buttons of IE and explorer with the shell32.dll bitmap 204--217. On the IE corner, the image is replaced by the bitmap 240-242 in shell32.dll. ※Modification to the shutdown/logout dialog box ※ The most frequently asked questions are the shutdown and logout dialog boxes. Shutdown is msgina. dll, Log out as shell32.dll.
privilege level) and IOPL (I/O privilege level). The two terms CPL (current privilege level) and RPL (Request privilege level) are also used when discussing protection mechanisms in data or code access. The CPL is the privileged level of the code or data segment that the task is currently accessing.For example, a CPL that is running a task is the access byte in
system calling.
4.8.1 direct CILS or jumps to code segments (direct call or jump to the code segment)The JMP, call, and RET commands are transferred in close proximity within the current code segment, so no privileged checks are performed. Remote JMP, call, and RET commands transfer control from one code segment to another, so the processor needs to perform privileged checks.When a transfer between code segments is not controlled by a call gate, the processor checks the information of four pri
("cmd.exe");} open the Registry () {process. start ("regedit.exe");} public static void open the palette () {process. start ("mspaint.exe");} public static void open the WordPad () {process. start ("write.exe");} open the player () {process. start ("mplayer2.exe");} open Resource Manager () {process. start ("assumer.exe");} public static void open the Task Manager () {process. start ("taskmgr.exe");} public static void open Event Viewer () {process. start ("eventvwr.exe");} public static void O
machine, such as the global search path .)
I. For vc8 and vc9
Write the following script:
"Call % vSxxComntools % vSVars32.bat ".Rem executes the corresponding CL command.
In this way, the above three requirements can be met:1. There must be correct vsxxcomntools variables on the client-unless the corresponding VC version is not installed.2. Execute the CL command.SeparatePut it in a script (assumingCpl. bat) To execute the same compilation process of vc8 and 9.
For different VC versions, Run
"Write the operating system yourself" read Sense http://blog.csdn.net/zgh1988/article/details/7059936
Comprehensive analysis of the first chapter of "self-writing Operating System" http://blog.csdn.net/zgh1988/article/details/7060032
Comprehensive Analysis of the "self-writing Operating System" Chapter 2 http://blog.csdn.net/zgh1988/article/details/7062065
Comprehensive Analysis of the "hands-on writing Operating System" Chapter 3 1 http://blog.csdn.net/zgh1988/article/details/7098981
Comprehens
For the first poor translation, I would like to thank google translation and youdao Dictionary (word translation ), this vulnerability is triggered because when the CPL icon is loaded using a specially constructed shortcut, the dll file will be loaded directly through the "LoadLibraryW" function (originally, the file resources were only intended to be loaded but not judged ). whether the dll file is a special CPL
HAL ).1. The control panel structure control panel is part of the Windows graphical user interface and can be accessed through the Start Menu. It allows users to view and operate on basic system settings and control, such as adding hardware, adding/deleting software, controlling user accounts, changing auxiliary function options, and so on. The control panel can be accessed through "start"> "Settings"> "Control Panel" in Windows 95, Windows 98, and Windows ME, or directly from the Start menu in
need to be created. The base address and size of the GDT in main memory are stored in GDTR processor registers, and the LDT addresses and sizes currently being used are placed in LDTR processor registers.The virtual address consists of 16-bit selectors and 32-bit offsets, and the segment registers only hold the selector. The CPU Segment Unit (SU) performs the following actions:[1] First examine the TI field of the selector to determine which descriptor table the descriptor corresponds to. The T
In-depth analysis of task switching and stack by Liu Wanli:Http://www.linuxforum.net/forum/showflat.php? Cat = board = linuxk number = 301272 fpart = allKeywords: time interruption, task switching, stack, linux0.01
Introduction:
What is the relationship between Task Switching and stack? Many friends may not know the relationship between them, and some may think that there is not much relationship between them (document 4 ). In my opinion, task switching is closely related to the stack! The fo
Linux0.11 kernel-process scheduling Analysis 2. scheduling, linux0.11 Kernel
[All Rights Reserved. For more information, see the source. Source: http://www.cnblogs.com/joey-hua/p/5596830.html]
In the previous article, process scheduling is ultimately to call the timer_interrupt function, in system_call.s:
#### Int32 -- (int 0x20) clock interrupt handler. The interrupt frequency is set to 100Hz (include/linux/sched. h, 5). # The scheduled chip 8253/8254 is initialized at (kernel/sched. c, 406. Th
The last one says that process scheduling boils down to calling the Timer_interrupt function in SYSTEM_CALL.S:# # # # Int32--(int 0x20) clock interrupt handler. Interrupt frequency is set to 100Hz (include/linux/sched.h,5), # Timing chip 8253/8254 is initialized at (kernel/sched.c,406). So here jiffies every 10 milliseconds plus 1. # This code will increase jiffies by 1, send an end interrupt instruction to the 8259 controller, and then call the # C function Do_timer (long
software, screen saver interferes with the normal disk scan, so that the program can not be normal, thus forming a dead loop.
Workaround:Close the memory-resident program before defragmenting the disk before defragmenting it. If disk defragmentation is still not possible after you remove these memory-resident programs, you should use ScanDisk to perform a comprehensive check of the disk, including surface testing, to troubleshoot the possibility of disk failure. In addition, if a user has not
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.