文件名称:007
介绍说明--下载内容均来自于网络,请自行研究使用
随着计算机的发展,越来越多人用上了个人计算机,而主流的操作系统是Microsoft的Windows。这种操作系统占据着PC操作系统市场的90 以上。但问题也随之而来,越来越多的针对该平台的病毒、*、黑客程序、恶意程序、流氓软件以及间谍程序盗窃和破坏用户数据。
研究发现,大多数上述非法程序是通过注册表来达到自启动的。那么只要我们拦截上述程序对注册表的访问,便可禁止他们启动,达到了保护用户数据的目的。在本次设计中,使用了SSDT Hook这种技术对注册表的访问进行拦截。这种拦截技术通用,功能强大。-With the development of the computer more and more people were using personal computers, while the mainstream operating system is Microsoft s Windows. The operating system, PC operating system market occupies 90 or more. But the problem has cropped up more and more of the platform for viruses, Trojans, hacker programs, malware, rogue software and spyware, theft and destruction of user data.
Study found that most of these illegal programs is through the registry to achieve from the start. So long as we block access to the registry the program can be launched against them to achieve the purpose of the protection of user data. In this design, the technology used SSDT Hook to intercept access to the registry. The interception technology universal and powerful.
研究发现,大多数上述非法程序是通过注册表来达到自启动的。那么只要我们拦截上述程序对注册表的访问,便可禁止他们启动,达到了保护用户数据的目的。在本次设计中,使用了SSDT Hook这种技术对注册表的访问进行拦截。这种拦截技术通用,功能强大。-With the development of the computer more and more people were using personal computers, while the mainstream operating system is Microsoft s Windows. The operating system, PC operating system market occupies 90 or more. But the problem has cropped up more and more of the platform for viruses, Trojans, hacker programs, malware, rogue software and spyware, theft and destruction of user data.
Study found that most of these illegal programs is through the registry to achieve from the start. So long as we block access to the registry the program can be launched against them to achieve the purpose of the protection of user data. In this design, the technology used SSDT Hook to intercept access to the registry. The interception technology universal and powerful.
相关搜索: malware
(系统自动生成,下载前可以参看下载内容)
下载文件列表
监控注册表.pdf
Biyesheji.rar
Biyesheji.rar