Hexadecimal to BCD code good Understanding, the problem is the BCD code to hexadecimal number;
HEX2BCD:
What is the BCD code for 0x3f? Correct answer: 99, or 0x63
0x3f=63, add 0x,->0x63, and then turn 0x63 into a (0x63=99)
1, if it is to be represented as 16 binary, then convert to 10 binary number, preceded by 0x symbol; (hexadecimal representation)
2, if you want to represent a decimal, then first converted to 10, preceded by a 0x symbol, and then add the symbol
hexadecimal number to decim
Source: SecurityEvent Type: Account LogonEvent ID: 680Date: 2010-2-4Event: 20:52:37User: TAGggg-DDD3333administratorCOMPUTER: TAGggg-DDD3333Description:Login User: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0Logon account: administratorSource Workstation: TAGggg-DDD3333Error code: 0x0
This log records the users who attempted to log on. For example, if you test the username and password in the login window, downloads are recorded here. If you find a record that is not a system user, so someone must hav
numbers.
345
42
Integer.
42
0378
Integer. Although it appears to be a octal number (starting with 0), 8 is not a valid octal number, so it is a decimal number.
378
0377
Octal integer. Note that although it looks 1 smaller than the number above, the actual value is very different.
255
0.0001
Floating point numbers. Although it starts with 0, it is not a octal number because it has a decimal point.
0.0001
0
, specifying the second parameter as a tokeninformationclass. The session is mentioned above, indicating that the terminal login session ID, you can use the GetTokenInformation, the second parameter is specified as Tokensessionid to query, or through the API Processidtosessionid to get The logon session represents the authority ID of the logon session, which can be queried by gettokeninformation, specifying the second parameter as Tokenstatistics. Logon session ID of the system login is 999 (
recorded. The Event Viewer records the most content. You can view all audit events in the security log.Let's take a look at the logon/logout event record of an account: Session interrupted connection from winstation: Username: guest domain: Refdom Login ID: (0x0, 0x28445D9) Session Name: unknown client name: GUDULOVER client address: 202.103.117.94This is a 3389 logon event. The system records the IP address, machine name, and user name used. It is quite complete.This is a detailed tracing reco
recorded. The Event Viewer records the most content. You can view all audit events in the security log.Let's take a look at the logon/logout event record of an account: Session interrupted connection from winstation: Username: guest domain: Refdom Login ID: (0x0, 0x28445D9) Session Name: unknown client name: GUDULOVER client address: 202.103.117.94This is a 3389 logon event. The system records the IP address, machine name, and user name used. It is quite complete.This is a detailed tracing reco
Some tools on the home computer are required to go out. A peanut shell is installed on the home computer and then routing port forwarding is enabled to enable remote services. An illegal process is found after the computer is turned on for several hours, the Guest user is also enabled. It is estimated that the hacker was disappointed to log on to the home computer and ran away without any evidence.
Event Type: Audit successfulEvent Source: SecurityEvent Type: logon/logoutEvent ID: 528Date: 200
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.