Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
The Windows Registry is upgraded as the Windows operating system continues to update. The registry is the internal database of Windows, so it is self-evident that it is important, but you may not know that the security of the computer connected to the Internet will be rigorously tested. If not prevented, the computer's important information, documents and other information will be completely exposed. Therefore, how to prevent malicious attacks or damage, to ensure system security has become a topic of great concern.
Windows XP Registry
The Windows registry is an internal database that is a huge tree-like hierarchical database. It accommodates all configuration information for applications and computer systems, initialization information for systems and applications, association relationships between applications and document files, 11585.html "> Hardware device Descriptions, status and properties, and various state information and data." Various parameters are stored in the registry. Directly controls the startup of Windows, the loading of hardware drivers, and the operation of some Windows applications, which play a central role throughout the Windows system.
Type of virus attack registry
First, the registry Hkey-loca-machlne\soptwaremicrosoft\windowscurrentversionrun loading program, so that the boot automatically run. Like "RUN" start, runonce,runservices, etc.
Ii. some viruses that damage the system. This kind of virus constructs the subkey in the registry Hkey-local-machineservecesvxdd directory, and sets the key value to L '. Causes the system to automatically load the virus program after it is run.
Third, the virus by changing the way the file is opened, this allows the program to start with the type of file you open. In registry Hkey-classes-rootexefile\shell\open\command, the default value is: "%1 '%". For example, change this default value to (Trojan.exe "%1"%+). Each time the EXE file is run, the Trojan.exe file is executed.
This article originates from http://www.516c.cn reprint please specify the source!