- duihuakuandeshiyon 实现简单的对话框的应用及控件的使用包含滚动条进度条等
- 02 5 定义用户信息的Form实现类 3.3.6 安全注册与登录的Servlet实现类 3.3.7 Servlet实现类在web.xml的配置 3.3.8 用户安全注册 3.3.9 用户安全登录 3.3.10 用户找回密码 3.4 动态校验用户注册的表单 3.4.1 功能描述 3.4.2 系统流程图 3.4.3 数据库设计 3.4.4 配置Struts框架
- school-system-program 适合大学生的学籍系统程序
- psd_following 关于室内移动机器人及其自主化技术的编程
- udp client server UDP 通讯
- MFE-toolbox Kevin Sheppard撰写的为了金融需求的Matlab工具箱
文件名称:007
-
所属分类:
- 标签属性:
- 上传时间:2012-11-16
-
文件大小:2.85mb
-
已下载:0次
-
提 供 者:
-
相关连接:无下载说明:别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容来自于网络,使用问题请自行百度
随着计算机的发展,越来越多人用上了个人计算机,而主流的操作系统是Microsoft的Windows。这种操作系统占据着PC操作系统市场的90 以上。但问题也随之而来,越来越多的针对该平台的病毒、*、黑客程序、恶意程序、流氓软件以及间谍程序盗窃和破坏用户数据。
研究发现,大多数上述非法程序是通过注册表来达到自启动的。那么只要我们拦截上述程序对注册表的访问,便可禁止他们启动,达到了保护用户数据的目的。在本次设计中,使用了SSDT Hook这种技术对注册表的访问进行拦截。这种拦截技术通用,功能强大。-With the development of the computer more and more people were using personal computers, while the mainstream operating system is Microsoft s Windows. The operating system, PC operating system market occupies 90 or more. But the problem has cropped up more and more of the platform for viruses, Trojans, hacker programs, malware, rogue software and spyware, theft and destruction of user data.
Study found that most of these illegal programs is through the registry to achieve from the start. So long as we block access to the registry the program can be launched against them to achieve the purpose of the protection of user data. In this design, the technology used SSDT Hook to intercept access to the registry. The interception technology universal and powerful.
研究发现,大多数上述非法程序是通过注册表来达到自启动的。那么只要我们拦截上述程序对注册表的访问,便可禁止他们启动,达到了保护用户数据的目的。在本次设计中,使用了SSDT Hook这种技术对注册表的访问进行拦截。这种拦截技术通用,功能强大。-With the development of the computer more and more people were using personal computers, while the mainstream operating system is Microsoft s Windows. The operating system, PC operating system market occupies 90 or more. But the problem has cropped up more and more of the platform for viruses, Trojans, hacker programs, malware, rogue software and spyware, theft and destruction of user data.
Study found that most of these illegal programs is through the registry to achieve from the start. So long as we block access to the registry the program can be launched against them to achieve the purpose of the protection of user data. In this design, the technology used SSDT Hook to intercept access to the registry. The interception technology universal and powerful.
相关搜索: malware
(系统自动生成,下载前可以参看下载内容)
下载文件列表
监控注册表.pdf
Biyesheji.rar
Biyesheji.rar
本网站为编程资源及源代码搜集、介绍的搜索网站,版权归原作者所有! 粤ICP备11031372号
1999-2046 搜珍网 All Rights Reserved.