one, the specific location is the Start menu, "Start" option
On the hard disk location is: c:documents andsettingsadministrator "Start" menu program to start;
The location in the registry is:
Hkey_current_usersoftwaremicrosoftwindowscurrentversionrun
Second, Msconfig
Msconfig is the System Configuration Utility in the Windows system, which is wide enough to include: System.ini, Win.ini, Startup items, and so on. In the same way, the inside is also a very favorite place to start the program!
1.system.ini
First, in the "Run" dialog box, enter "Msconfig" to start the System Configuration Utility (hereinafter), find the System.ini tag, inside the "shell= ..." Can be used to load special programs. If your shell= behind is not the default Explorer.exe, or there is a program name behind, then you have to be careful, please carefully check the appropriate procedures are safe!
2.win.ini
If we want to load a program: Hack.exe, then it can be in win. INI is implemented using the following statement:
[Windows]
Load=hack.exe
Run=hacke.exe
What to do, you should know it!
This point, use the Rubik's Cube (click here to download) in the system settings-startup item settings, at a glance, and can easily remove and add startup items.
3. "Start" project
The boot tag in the System Configuration Utility is not the same thing as the "startup" folder we mentioned above, and this startup project in the System Configuration Utility is a collection of Windows system startup projects. Almost all startup projects can be found here-and, of course, programs that have been specially programmed can be not shown here in another way.
Open the Startup tab, and the Startup Project lists the startup program name, under command is the specific program attached command, and the final "location" is the program's location in the registry. You can be suspicious of the program for detailed path, command check, once found that the error, you can use the "disable" below to prohibit the program when the boot load.
Generally speaking, in addition to the system based on hardware and kernel part of the system software startup project, other start-up projects are appropriate to change, including: antivirus programs, specific firewall programs, playback software, memory management software. That is, the startup project contains a list of all of our visible programs, and you can use it to manage your startup program.
Third, the corresponding startup loading project in the registry
Registry Startup items are viruses and trojans most love! The stubborn nature of the virus Trojan is through the registry to achieve, so the usual time can download a registry monitor to monitor the registry changes, Rubik's Cube (click this download) A series of security features will also be included in subsequent releases to monitor malware modifications to the system, and so on. Especially when installing new software or running new programs, be sure not to be fooled by the beautiful appearance of the program. Be sure to see the essence of it is not a Trojan camouflage shell or a bundle of programs! If necessary, you can restore the registry according to the backup, so there is a lot of online registration, so there is no more details.
We can also use the manual method to check the corresponding location in the registry, although many of them are and above the location repeat, but for network security, be careful never too much!
Pay attention to the security, Clean system registry keys for comparison, if found inconsistent place, we must find out what it is! Do not believe in the outside of the "system", "Windows", "ProgramFiles" and other names, everyone knows "the truth". If after a detailed comparison, you can be sure that it is unclear procedures, do not hesitate to delete immediately!
Four, Wininit.ini
We know that Windows Installer often call this program to implement the installation after the deletion of the work, so do not underestimate it, if you tamper with it, it can be said to be very hidden, very perfect!
It is in the Windows directory of the system disk and opens it with Notepad (sometimes Wininit.hak files) to see the appropriate content. Obviously, we can add the corresponding statements inside to achieve the purpose of modifying the system program or deleting the program. If it is a file-related trojan, you can delete it by Winint.ini to the original file after infection, so as to really hide yourself!
Five, the fight under DOS
Finally, we say that the boot project load under DOS, Config.sys, Autoexec.bat, *.bat and other files can be used in a specific programming way to achieve the purpose of loading programs. So do not think that DOS is an outdated thing, good DOS programming can often achieve very simple, very practical functions.