Tskill and NTSD commands, two can end the task Manager process, or, alternatively, you can close the application. However, the use and scope of the two are different, the following, this article to give you a brief introduction.
Introduction to the
Interactive interface Design
Nothing to say, look at the Master Design Menu interface bar:
@echo off
CLS
title Ultimate Multipurpose Repair
: Menu
cls
color 0A
echo.
echo ==============================
echo Please select the
Use the script kill process, Syntax: run script + process name, script kill
The script is attached below, and the permission must be attached to X for execution.
#! /Bin/sh # pid kill thread for chenglee # if fileformat = dos, update fileformat =
Web site encounters a Dos attackI. Background of the eventLong vacation for IT staff is a short period of recuperation, but it system can not stop, the more holidays, the more likely to be a big problem, the following is a case of a Dos
Web site encounters a Dos attackI. Background of the eventLong vacation for IT staff is a short period of recuperation, but it system can not stop, the more holidays, the more likely to be a big problem, the following is a case of a Dos
Real case: DOS attacks on websitesDOS attacks on the ghost website I. Event background
Long holidays are a short vacation period for IT staff, but it systems cannot be stopped for a while. The more holidays, the more likely a major problem may occur,
Principle and classification of no-kill
There is no doubt that the "kill-free" technology is one of the hottest technologies at present. "Kill-free" is a hacker technology with high availability and wide application scope. Kill-free is often the
DOS Process view and stop command
To view a process:
Tasklist/svc
To stop a process:
Taskkill/im 2468/f
dos view process, end Process command (common hacker commands)
shall want to upload a trojan or something, there will always encounter some
According to the process name killing
This method is implemented by the Taskkill command under the WinXP system, before using this method, first you need to open the process list interface of the system to find the specific process name
There are two very important commands in cmd. After we get the dosshell of the other party, we want to send messages to the other party.Remote control software such as Ma or rdmin, but the opposite party has enabled the firewall that comes with win,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.