that is, when CreateFile open the file name designation: "\\.\device" is OK.because the code is relatively short, so I do not make comments, I believe you can see the code to understand the meaning.also read and write here is floppy disk a disk NO. 0 sector, if you want to read and write other sectors, you can use the API SetFilePointer.The method of reading the sector (the following code demonstrates reading data from the No. 0 sector of a drive and writing to the file Boot.bin):#include #inclu
1, set the life timeHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
DefaultTTL REG_DWORD 0-0xff (0-255 decimal, default value 128)
Description: Specifies the default time to Live (TTL) value set in outgoing IP packets. The TTL determines the maximum time that an IP packet survives on the network before reaching its destination. It actually qualifies the number of routers that the IP packet is allowed to pass before it is discarded. This value is sometimes used to detect rem
In the Windows 2000 Active Directory (AD) environment, you can use site to physically divide the network to optimize AD replication. By understanding how Microsoft is implementing AD replication in your domain, you can more effectively divide your network into AD sites, thereby reducing the flow of network connections over slow networks. This article is the first part of a two-series article on the Active D
RAID (Redundant array of inexpensive disks) means a redundant array of inexpensive disks, a fault-tolerant approach that provides high levels of availability and redundancy by concatenating a large number of disks logically. As we all know, a hardware RAID solution is an effective approach, but its cost is very high ... Windows nt/2000 provides embedded software raid that implements RAID0, RAID1, and RAID5.
Remote Terminal Services in a Windows 2000 system is a very powerful service, but also become an intruder in the host of the channel, the intruder can use some means to get the administrator account and password and intrusion into the host. Next, let's look at how to prevent hacking by modifying the default port.
As we all know, remote Terminal Services is based on port 3389. Intruders usually scan the hos
Hackers are mostly hacked through ports, so your server can only open the ports you need, so what ports do you need? Here are the common ports you can choose from:
80 for Web site service, 21 for FTP service, 25 for e-mail SMTP service, 110 for email POP3 service.
There are also SQL Server port 1433 and so on, you can find the relevant information on the Internet. Those unused ports must be closed! To close these ports, we can proceed through the Windows
Under Windows 2000, because the default security configuration for RDS is different from the IIS4, which causes RDS to be unusable, the following are the configuration steps that I translate and summarize in accordance with the instructions for RDS in the ADO documentation for the Microsoft MDAC 2.6 SDK. I have been configured to succeed in the server, is for your reference.
1, use the "Computer Management"
. Because this feature is intrinsic to the Windows 2000 operating system, the switch is ignored. Accept this switch only for compatibility with previous versions of MS-DOS.
/q
Suppresses the display of XCOPY messages.
/F
Displays the source and destination file names when copying.
/L
Files are not copied, only the files to be copied are displayed (listed).
/d[:d ate]
Copies only those source files that have
window| Security | Online IIS security Verification mechanism is done very well, we can use ASP security authentication to the Windows 2000 Manager password online modification.
When someone logs on to the site, use the Login_user in the ServerVariables collection to capture the login account, if you must turn off the option to allow anonymous logons in IIS, and then modify the password by ADSI in the chang
First, the principle
Interactive login support in nt/2000 is implemented by Winlogon calling the Gina DLL, and the GINA DLL provides an interactive interface to provide authentication requests for user login. Winlogon interacts with the Gina DLL, which defaults to MSGINA.DLL (under the System32 directory). Microsoft also provides us with interfaces, and we can write our own Gina DLL instead of MSGINA.DLL.
3 desktops are created when Winlogon is init
window| detailed below Windows 2000, because the default security configuration of RDS is different from IIS4, which causes RDS to be unusable, the following are the configuration steps that I have translated and sorted out based on the description of RDS in the ADO documentation for the Microsoft MDAC 2.6 SDK. I have been configured to succeed in the server, is for your reference.
1, use the "Computer Man
Windows 2000 organizes and manages resources in the network as an Active Directory, and the Active Directory is implemented in the form of a domain, each of which consists of one or more domains. In the domain, the most important server is the domain controller, and the domain controller holds the Active Directory database for the domain, and any actions by the user to the domain are performed through the d
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.