interruption or exception occurred while running the previous command. If an interruption or exception occurs, the Control Unit performs the following operations:
1. Determine the vector I associated with the interrupt or exception (0 ≤ I ≤ 255)
2. Read the I entry in the IDT table directed by the idtr register.
3. Obtain the base address of GDT from the gdtr register and search for it in GDT to read the segment descriptor identified by the selector in the IDT table. This descriptor specifies t
Important: This article contains information about how to modify the registry. Before modifying the registry, you must back up the registry and know how to restore the Registry in case of a problem. For more information about how to back up, restore, and modify the registry, click the following article number to view the article in the Microsoft Knowledge Base:
256986 (http://support.microsoft.com/kb/256986/) Microsoft Windows registry description
Symptoms when you install and uninstall a progra
complete a particular function), and when the service is completed, the execution is returned to the normal program. Execution is reduced to ring3 (at this time in a restricted state, only ordinary instructions can be executed).With regard to the validation and transformation of privilege levels, IA32 has a complex set of mechanisms. For simplicity, here's a simple introduction to the area involved.First of all, 3 noun concepts need to be recognized: CPL
In Vista, you can hide the CPL file by writing the Registry to hide the icon on the control panel. If the hiding CPL file is invalid, you can hide the guid. However, a lot of information on the Internet can only take effect under XP or 2000. During my work, I was cheated by the information on the Internet. So I listed the CPL files and UUID that I tested. I hope
1, press Win+r to open the run, enter the following path return
%SystemRoot%\System32
2, in the System32 folder search *.cpl, the search results will show the control panel of some gadgets. Part. Cpl is added to third party software, which adds its own entry in the Control Panel.
3, repair the damaged. cpl file.
Double-cli
4GB address space when the user state is running, which is the code you see, and when a process has just been created, its user-state stack pointer is set near the end of its address space, and the application continues to use the stack when it is running in the user state. The actual physical address memory is determined by the CPU paging mechanism.In the kernel State runtime, each task has its own kernel-state stack, which is used during the execution of the task in kernel code, after the sys
ZZ from:http://blog.csdn.net/tomcui/archive/2008/01/22/2058502.aspx
Windows Control Panel Programming
Note: This article for me in the project to check the relevant articles written, if there are improper, please point out.
Mail:tomcui60000520@163.com
Key words:
Control Panel, Control Panel application,
One, What is the control Panel
Open Windows Control Panel to see a similar image
Figure I
Double-click on one of the icons, will display a dialog box, so that users to complete the c
program displayed after installation)
Taskmgr
Task Manager
Tasklist/svc
View process details
Eventvwr
Event Viewer
Eudcedit
Word Creation procedure
Explorer
Open "My Documents"
Packager
Object packaging Program
Perfmon. MSC
Computer Performance Monitoring Program
Regedit
Registry Editor
Rsop. MSC
Group Policy result set
Regedt32
Registry Editor
Rononce-P
Shutdown w
, and the derived code must adopt the lgpl protocol. therefore, the open source code of the lgpl protocol is suitable for being referenced by commercial software as a third-party class library, but it is not suitable for the lgpl protocol code, secondary Development of commercial software is implemented through modification and derivative methods.
GPL and lgpl both protect the intellectual property rights of the original author and prevent people from copying and developing similar products usin
3. Note on instance Four
The background and implementation methods of partial fragments in the program are described in the previous example, the following is mainly on how to implement the task of the privilege level transformation to do some explaining:
(1) Implementation of Privilege level transformation through the return instruction between segments
The instance uses the return instruction between paragraphs to implement the privilege level transformation within the task. One is a demo s
interruption or an exception occurred during the execution of the previous instruction. If so, the control unit will drop the instruction and enter the following process:1. Determine the vector I (0£i£255) associated with the interrupt or exception.2. The IDTR register reads item I from the IDT table (in the following description, we assume that the IDT table entry contains an interrupt gate or a trap gate).3. Obtain the base address of the GDT from the GDTR register and look in the GDT table t
ManualClear the IE cache (Temporary Internet Files, cookies, history records, form records, and Internet password). You can use the "Internet Options" Control Panel (for example.
If you wantCommand LineTo clear the iebuffer, you can use rundll32.exe to run the corresponding functions of Internet Options.
For example:
Temporary Internet Files (Temporary Internet Files)
Rundll32.exe inetcpl. CPL, clearmytracksbyprocess 8
useTherefore, the open source code of the lgpl protocol is suitable for being referenced by commercial software as a third-party class library, but it is not suitable for secondary development based on the lgpl protocol code through modification and derivation.Commercial software.
GPL and lgpl both protect the intellectual property rights of the original author and prevent people from copying and developing similar products using open-source code.
Cpl
in the IDT table. This descriptor specifies the base address of the segment where the interrupt or exception handling program is located. 4. Make sure that the interruption is initiated by the authorized (interrupted) source. First, compare the current privileged CPL (the lower two digits of the CS register) with the descriptor privileged level of the segment descriptor (that is, DPL, stored in gdt). If CPL
Control Unit performs the following operations:
1. Determine the vector I (0 ≤ I ≤ 255) associated with the interrupt or exception ).2. Read the I entry in the IDT table directed by the idtr register (in the following analysis, we assume that the IDT table item contains an interrupt door or a trap door ).3. Obtain the base address of gdt from the GDTR register and search for it in gdt to read the segment descriptor identified by the selector in the IDT table. This descriptor specifies the base
Interrupt service program.
Here, the CPU will be based on the current CS register in the CPL and GDT segment descriptor of DPL, to ensure that the interrupt service program is higher than the current program, if the interrupt is a programming exception (such as: int 80h system call), then also check the CPL and IDT table in the interrupt descriptor DPL, To ensure that the current program has permission to
Not long ago, Inprise Company (formerly Borland Company) officially announced Delphi version 5.0, its development wizards support the "Control Panel program (CPL)" framework of the generation, using it can quickly and easily develop CPL programs. Is it possible to develop CPL programs in the existing Borland C + + Builder?
A
priority (CPL ).
The segment descriptor is an 8-byte representation of the segment. It is stored in the Global Descriptor Table (gdt) and Local Descriptor Table (LDT). Because the segment descriptor contains a large amount of content, we will not describe them here. The key is a two-digit descriptor privilege level (DPL), which is mainly used to restrict access to this segment. It indicates the Minimum CPU priority that can access this segment.
The
How to modify system attributes
Many friends also want to know How JS modifies the software and hardware information of these computers. As soon as I searched for the Internet, there were still a lot of articles, and I modified one of them. After some exploration, I was done, and I felt that it was really not a new technology. ..................................................................................................................... ^-Nn myFirst, set sysdm in the C:/Windows/sy
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.