sysinternals

Want to know sysinternals? we have a huge selection of sysinternals information on alibabacloud.com

7 better replacement software for common Windows programs

alternative Process Explorer-task manager replacement product Process ExplorerFrom sysinternals is a great Windows Task Manager alternative to get an in-depth look at all of the running processes on your computer, including where individual executables are located, search capabilities for individual DLLs, plus a much more detailed look at system resources, and where they are being allocated. FromSysinternalsProcess ExplorerIs a powerful replacem

Reduce the size of virtualbox virtual hard disk files

: 12 sudoddif=/dev/zeroof=/EMPTYbs=1Msudorm-f/EMPTY In Windows, you need to download sysinternals suite and execute: 1 sdelete–z 2. compress the disk Shut down the Virtual Machine. Now you can compress the virtual hard disk. If your virtual hard disk is in the VDI format of virtualbox, find your virtual hard disk file and run the following command: 1 VBoxManagemodifyhdmydisk.vdi--compact If your

Use undisclosed functions to write disk formatting applications

If you want to add the format (Format) function of the operating system to your application, like the format utility of the system, what should you do? If you search by Google, the most popular Chinese document is "disk formatting programming implementation", which uses the shformatdrive function to call the system's formatting tool to complete the Formatting Function. Is there a way to implement it using your own code? Refer to an article in sysinternals

Interpreting the hierarchical Driver Model of Windows 2000/XP

driver (implemented in ntoskrnl.exe). If you have checked build's ntoskrnl.exe, you can easily find it from base/ntos/IO/pnpmgr/pnpdd. c implementation. Have you seen the Windows XP source tree exported by sysinternals ?), She implements a virtual bus called root. All legacy devices are connected to this virtual bus. If you do not believe it, choose show hidden devices on the sketch listed on devmgmt. MSC ". In this sense, she wants to create a PDO f

Example of synchronization between processes among multiple producers-one consumer-outputdebugstring

converted from ASCII to Unicode. However, becauseOutputdebugstringThe data in the memory buffer is finally passed to the debugger as ASCII, which has a pair opposite to the conventional A/W pair. This implies that if you want to send a shortcut message to the debugger In the Unicode program, you can directly call the "A" version to implement it: OutputDebugStringA("Got here to place X"); Simple implementation of outputdebugstring for monitoring the user layerVC Knowle

Windows Vista product compatibility lecture-Course Materials

This course has been going on for nearly a week, including Beijing, Qingdao, and Jinan. I have talked with many friends about how to improve the heroic program for Vista, many friends have raised many questions. Today, I sorted out some materials: MSDN course home: http://www.microsoft.com/china/msdn/events/featureevents/2006/VistaCompTrain.aspxVista Logo authentication home: http://microsoft.mrmpslc.com/InnovateOnWindowsVista/ The course ppt is published for you to download:Module 1-Intro to

Install Google Chrome on a non-System Disk

Chrome's default installation path "C: \ documentsand Settings \ Administrator \ Local Settings \ Application Data \ google \ chrome" (This installation path is not necessarily, depends on the user name in your computer ). In this case, any modification to the original path (including installation) is actually targeted at the "F: \ ProgramFiles \ google \ chrome" path. You can also say that the two paths share the same disk space. In reality, the safe deposit box installed on the wall is opened

Duplicate sid installation in oracle and repeated oraclesid

, Microsoft's ResourceKit also provides the tool getsid, which is also included in the sysinternals toolkit. In fact, the principle is to read the registry value, which saves some trouble. Repeated Oracle SID Solution After Oracle is uninstalled, it is installed again. If the configured SID is the same, "the specified SID already exists on the local machine. Please specify a different SID ."Implementation Method:1. Choose "start"> "Settings"> "Control

Output debugging information

process" that can be found in ms visual c or in real interactive development environments. In a sense, any program that implements the protocol is a "Debugger ". It may be a very small command line tool, or something as advanced as the debugview of the smart guys from sysinternals. Content directory Application Usage Protocol Permission problems Implementation Details Confused Unixwiz.net tool: dbm

Delete the javasgkvsq. vmx, Autorun. vinf worm.

doesn't work ). DownloadProcess ExplorerAndAutorunsFrom sysinternals (we may or may not use this ). Download Moso force Delete (just in case we need to delete something that can't be deleted ). Now let's start... Removing the specified gkvsq. vmx virus from your computer Disconnect your computer from the network, if it is connected. Removing the network cable from your PC shoshould do the trick. Just runFixdownadup.exeWe downloaded from Symant

[Debug]. Net debugging and C ++ debugging Resources

The following is a summary of tools and resources that you might be interested in after taking the. NET debugging and/or C ++ debugging courses we offer at SELA. [Shameless plug: If you haven't taken these courses yet, I strongly suggest that you check them out. between the two of them they have more than 20 hands-on debugging exercises which basically guarantee that you're re going to come out a windbg expert and be able to analyze dumps, solve problems in production, pinpoint memory leaks, a

Analyze Mozilla code's "seven weapons"

compile the Mozilla Project (either Firefox or SeaMonkey), cygwin must be installed first. Weapon 4: Telescope debugviewWebsite: http://technet.microsoft.com/en-us/sysinternals/bb896647.aspxYou know, there is no way to debug the Mozilla project at the breakpoint, and you must be dumpfounded when you are familiar with Visual Studio. To track program execution paths and variable values and determine whether the modified Code runs well, outputdebugstr

Use procdump to solve windows application crash

the application and obtain the process dump. By analyzing the process dump, you can find out which programs, DLL files, and errors occur when the process is interrupted. This allows you to search for similar scenarios on the Internet to determine whether a known problem has occurred or whether you need to contact the seller. What makes procdump different from the previous tool is that it can detect CPU peaks and collect process dump when it reaches. This is very useful for intermittent problem

Unable to log on to the local database after the computer name is changed due to SQL Server problems

connection http://blog.csdn.net/dba_huangzj/article/details/7927266) Download PsExec address: http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx Note: pluxec is a component of PsTools. After the download is complete, open CMD as an administrator and cd it to the extract directory of PsTools. Then run the following command: Export xec-s-I "C: \ Program Files (x86) \ Microsoft SQL Server \ 100 \ Tools \ Binn \ VSShell \ Common7 \ IDE \ Ssms.

Using xec issues with Jenkins

://stackoverflow.com/questions/5653836/psexec-hang-while-being-executed-from-a-very-simple-c-sharp-or-c-gui-program-c However, the test is useless. Another buddy said "Add-h", but I checked "Export xec /? No-h option was found. At this time, I began to suspect that I was using the PSExec version. At first glance, 1.96 was used, and the latest version was 1.98, hurry to Microsoft's website to download the latest javasxec (http://technet.microsoft.com/en-us/sy

. NET object vs. Windows handle (a): The basic concept of a handle

, you can see that the Notepad process currently has 59 handles open.The task Manager that comes with the system has a handy view of the number of handles, but if you want to know what these handles are, you can use process Explorer. Process Explorer is a session viewer in the Windows Sysinternals Toolkit, which can be downloaded from here. If you see a different view, you can click View, check Show Lower Pane, and select handles in Lower Pane view. A

Free preferred software under windows

PS: The following are listed in the installed order, "|" After the number is the alternative software.Boot boot: EASYBCDVirtual machine: VirtualBoxLinux:zorin | Linux Mint (Mate) | UbuntuDrive tool: Drive Wizard | Master LuVirtual optical drive: DAEMON Tools LiteSystem settings: Rubik's Cube 5Compression: 2345 Good Pressure | 7-zipPictures: 2345 View KingInput method: violet Pinyin Input MethodDictionary: PowerWord | Youdao DictionaryPDF: Fast PDF ReaderSecurity: 360Browser: ChromeDownload: Thun

How to pause (suspend) a running process under Windows cmd

In the development of Linux, we are familiar with Ctrl + Z instructions, the role is to move the current running program to the background, pause execution, wait until the appropriate time and then use the FG command to call the program again to execute. This feature is also not commonly used, but sometimes it is quite necessary.So what do you do if you need it under Windows? I am not familiar with Windows, I do not find a ready-to-use method. I suspect that Windows does not provide this functio

Programmatic implementation of Windows system automatic login

DontDisplayLastUserName 1 Note that the following two key values must be removed or a notification dialog box will be displayed. LegalNoticeCaption LegalNoticeText There are also 2 key values, with the following functions: Ignoreshiftoverride ignores the SHIFT key, by default the login dialog box (even set to auto-login) is displayed by pressing SHIFT when you turn it on, and when you set it to 1, pressing the SHIFT key is useless.

Parse the Active Directory information exposed to the user

access the correct shared files, printers, mailboxes and applications. Can some "spyware" enterprise users use other methods to obtain information stored on the AD? Have you checked your Active Directory as a standard domain user account? If you are responsible for domain security, you must find out which information is exposed to users by default.Check Directory If you want to check which information is exposed to users, you can log on as a normal user in the test environment (default domain s

Total Pages: 11 1 .... 5 6 7 8 9 .... 11 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.