From: http://spinlock.blog.51cto.com/607469/174696
Author: kevx
Although most people work, study, and entertain on windows every day, many people still do not know about its kernel structure. On the one hand, because of its kernelSource
ArticleDirectory
Control Application (consctl)
Download source files-33 KB
Abstract
Intercepting and tracing process execution is a very useful mechanic for implementing nt Task Manager-like applications and systems
The virus utilizes the IFEO technique of redirect hijacking, make a large number of anti-virus software and security-related tools can not run, will destroy the safe mode, so that the poisoned users can not be in safe mode to kill the virus, will
Principles for developing security policies
The so-called network security refers to the sum of preventive measures taken to protect the network from various dangers inside and outside the network. The network security policy is designed to address
In the NT-series Windows operating system, malware can make itself bootable by correlating winlogon specific events, such as Lock,logoff,logon,shutdown,startscreensaver,startshell, Startup,stopscreensaver,unlock and so on, which can even allow
1. The content of this article comes from courseware and student notes of famous universities (on campus, I often see someone buying notes at high prices)2. The instructor does not provide references, so he can only thank you for your
Local Area network (local areanetwork, LAN), also known as Intranet, refers to a group of computers interconnected by multiple computers in an area.LAN can achieve file management, application software sharing, printer sharing, scanner sharing,
We often use the security mode to handle viruses, Trojans, and rogue software. This is because the security mode ignores the startup items. However, not all startup items are ignored, making the security mode insecure.
For example, the shell and
Use the advanced clean boot troubleshooting or troubleshooting console to fix Windows XP startup Problems
Many of the problems you encounter on Windows XP-based computers may be caused by incompatibility or corrupted programs. To determine whether
when using Windows XP, do not forget to create a boot disk that restores the account and password in Windows XP at the same time as setting the password for the first time. It helps you avoid formatting the hard disk. select "User Account" from the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.