- 4
- 0
- 约1.31万字
- 约 13页
- 2017-10-07 发布于河南
- 举报
网页黑手是如何攻击你的windows系统的(How does the black hand attack your Windows system)
网页黑手是如何攻击你的windows系统的(How does the black hand attack your Windows system)
How does the black hand attack your Windows system?
Authors: Chen Jinhong, computer world, 2002-07-01, 11:21:03
The popularity of the Internet has made our world a better place, but it also has unpleasant moments. For example, when you received a letter from the theme of I Love You message, double-click the attachment to when excitedly enjoy the love letter, but have become victims and disseminators of the virus; or when browsing a web page when the browser title bar becomes a similar Welcome However, the default home page has also been modified, and your registry is rather baffling lock, that is when we run the regedit.exe system, such as: a pop-up registry has been disabled by the administrator, please find the system administrator And so on; and what is more, when you hear about browsing your web page, your hard drive may also be quietly formatted Its horrible! Is there such a thing?
Of course it is true, do not believe it, then you dare to go down to see it?.
In fact, the love bug (I Love You message) and those malicious damage your system is not terrible, they are not complicated by a few of the VB Script code to write, as long as you understand the truth, it will have to deal with them, then you have to worry about they? In this paper, the destruction of the system web page black hand to be analyzed, and gives prevention and repair methods, so that everyone can live safe and happy life..
Say, VB Script, you have to start with WSH.
One, what is WSH?
WSH is the abbreviated form of Windows Scripting Host (Windows script host). The concept of WSH first appeared in the Windows 98 operating system, a scripting environment based on a 32 bit Windows platform and language independent. For example: you write a script file, such as suffix.Vbs or.Js file, and then double-click and execute it in Windows, then the system will automatically invoke an appropriate procedure for interpretation and executi
您可能关注的文档
- 研究生复试面试英语口语(Graduate interview interview oral English).doc
- 研究生读研期间学费问题(Tuition during graduate school).doc
- 矿产资源分布2(Mineral resources distribution 2).doc
- 研究社会责任会计的概念框架(Study the conceptual framework of social responsibility accounting).doc
- 研英语大纲新增统考英语(New English for new English study program).doc
- 研究型课程的定位, 特点及实施中的难点问题(The orientation, characteristics and difficulties in the implementation of research courses).doc
- 砖总类(Brick class).doc
- 砖头、沙子都有品牌——博锐智达实现工业品牌快速超越的4维策划法(Bricks, sand has brand Zhida industrial brand vPro beyond the 4 dimensional planning method).doc
- 破解excel写保护(Crack excel write protection).doc
- 破伤风(Tetanus).doc
- 罗伯特 麦基访谈1(Robert Mcgee interview 1).doc
- 网马综合生成器(感谢showtime提出bug已经修复)(Var Comprehensive generator (thanks to Showtime bug has been proposed to repair)).doc
- 罗安宪为师有为师之道(Luo Anxian to be a teacher is the way to be a teacher).doc
- 罗可可艺术(Rococo).doc
- 网页设计网站参考文献(Web design, web reference).doc
- 罗密欧与辛度瑞拉(Romeo and Sandro Rilla).doc
- 罗布麻(Apocynum venetum).doc
- 罗经差测定评估讲义(Compass error assessment instruction).doc
- 罗马法的影响(The influence of the Rome law).doc
- 羊和马(Sheep and horses).doc
原创力文档

文档评论(0)