WinXP has been launched for more than ten years. I believe everyone is familiar with it, but do you really know all about WinXP? In fact, there are many hidden in WinXP. Little secrets that people know, don't know if you want to share the knowledge of this hotkey vulnerability. Whether you know it or not, let's take a look!
WinXP's hotkey is a key and a set of keys used to launch a program or use a function of a program. A key can include F1. F2 These function keys can also be some special keys.
Tips: Two Concepts
1. Hot Keys
A hot key is a key used to start a program or use a function of a program. And a set of keys, a key can include F1, F2 these function keys, but also some special keys, such as the DELL keyboard, "internet", "mail", and other keys that are not on the general keyboard, the most common Mainly some combination keys, the most familiar hotkey for people who use QQ is the “ctrl+~” key combination, which is used to open and quickly view the sent information.
There are also many hotkeys that can be used to open programs. These hotkeys can be set by themselves. After setting, they can be used to open various programs. You can determine the rules for each program's settings, so that it can be effective. Use the hotkey function, for example, according to the first letter of the program, so after setting, you can easily open the notebook with “ctrl+Alt+N”, open Word with “ctrl+Alt+W” For those who are particularly dependent on a tool, such a way to open a program is very convenient and therefore widely used.
2, WinXP "self-deregistration" function
When we are in the office, we often need to leave temporarily, and put the computer on the desk, which means the information is If you have a password, you can't move your computer. This ensures security.
In WinXP, it provides a feature that we call "self-logout" (that is, automatic logout), which has the same effect as a screen saver, and has a section on your computer. When the time is at rest, it will automatically log out, but this "logout" is a fake logout, all your background programs are still running, there is almost no difference before the logout, which leaves a hidden danger .
Vulnerability Description
The hotkey function is a service provided by the system (specifically, open the program, use the program's hotkey), and the service has not been executed during the startup process until the login interface. This feature is only enabled when you log in as a user. After execution, the user can use the hotkeys of the user's own settings (including some default hotkeys).
Suppose a user (he has the identity of an administrator and logs in as an administrator) has something to leave for a while, thinking that he will be back soon, but then he was forced to return immediately, and his computer was Exposed to the case of no protection, then WinXP (the operating system of the computer mentioned here refers to WinXP, and the operating system does not set the screen saver and the corresponding password) is very smart to automatically implement " Self-deregistration & rdquo;.
If this kind of cancellation is really written off, then this security measure is obviously very good, but as mentioned before, this kind of cancellation is fake, although others can't enter your desktop, I can't see what's on your computer, but they can also use the hotkey because the hotkey service hasn't stopped.
At this time, a hostile and experienced person can use these hot keys to do something. The easiest thing is to open N big programs to destroy your machine, you can open and use a program. Especially some network-related sensitive programs (and services) ……
In fact, this computer is half controlled by him, as long as he has enough imagination ……
Security Countermeasures
In fact, we have to admit that the above vulnerability is being used to really make destructive things. The probability is very small. It needs a lot of "what if" is established, but as A loophole, it is actually there, not afraid of 10,000, just in case, just like "CDautorun", as far as we know, it has not really been used to cause damage, but this kind of destructive security The possibilities are real, so in many public places (such as Internet cafes), this feature is turned off.
The above is the secret of the WinXP hotkey vulnerability that Xiaobian shared for you. After reading this tutorial, I believe you will also take some measures on your WinXP system to prevent this hotkey from being vulnerable. Program intrusion. Only by doing a sufficiently secure defense can we safely operate the WinXP system.
Win7 computer shutdown button settings teaching. Some users, after the shutdown, the keyboard or mou
as a hot spot for Microsofts ecosystem. Microsofts former employee Nawzil recently revealed some abo
Today, the Windows 10 system has been upgraded, upgrading from the 14986 version to the 15002 versio
Multi-core processor, which integrates two or more completed computing cores in one processor. Altho
Win7 how to switch dual sound card
Msvcr100.dll lost solution in Win7 system computer (two methods)
The computer icon on the win7 64-bit system desktop is gone. You can't enter the resource manager.
How to set Win10 Build 9926 active tiles directly on the desktop?
How to uninstall the KB3000850 patch to solve the incompatibility problem of the Win8 system
Under the Win10 system, the C disk space is gradually reduced. What is the reason for how to solve
How to add an app shortcut in the Win10 Start menu
Microsoft Build 2015 Developer Conference Win10 can run Android/iOS application
Win 7 notebook connection wifi can not enter the password solution (graphic tutorial)
Win7 free upgrade to activate Win10 official version of the three methods
How to use the recorder in the Win10 system? The step recorder of
Win10 blue screen 0x000000d1 error code how to do
Restore Win 7 Quick Launch Bar Library to My Computer
Let Windows 8 start screen wallpaper/magnetic stickers change to
Win10 boot prompt "Your device is offline" How to solve
Redis common operation command
Mito see how to look at the psd file? Mito look at the psd file tutorial
Retrieve lost input method icon with ctfmon.exe file
New feature prediction for Windows 8 system
XP system input method loss solution
Detailed explanation of the functions and parameters of the Linux system ar command