scispace - formally typeset
Search or ask a question

Showing papers on "Windows NT published in 2010"


Journal ArticleDOI
TL;DR: Using the debug structures embedded in memory dumps and Microsoft's program database (PDB) files to create a flexible tool that takes an arbitrary memory dump from any of the family of Windows NT operating systems and extract process, configuration, and network activity information is proposed.

51 citations


Journal ArticleDOI
TL;DR: This work presents an approach to implement user-mode memory scanning for Windows, which essentially means scanning the virtual address space of all processes in memory in case of an infection.
Abstract: Memory scanning is an essential component in detecting and deactivating malware while the malware is still active in memory. The content here is confined to user-mode memory scanning for malware on 32-bit and 64-bit Windows NT based systems that are memory resident and/or persistent over reboots. Malware targeting 32-bit Windows are being created and deployed at an alarming rate today. While there are not many malware targeting 64-bit Windows yet, many of the existing Win32 malware for 32-bit Windows will work fine on 64-bit Windows due to the underlying WoW64 subsystem. Here, we will present an approach to implement user-mode memory scanning for Windows. This essentially means scanning the virtual address space of all processes in memory. In case of an infection, while the malware is still active in memory, it can significantly limit detection and disinfection. The real challenge hence actually lies in fully disinfecting the machine and restoring back to its clean state. Today’s malware apply complex anti-disinfection techniques making the task of restoring the machine to a clean state extremely difficult. Here, we will discuss some of these techniques with examples from real-world malware scenarios. Practical approaches for user-mode disinfection will be presented. By leveraging the abundance of redundant information available via various Win32 and Native API from user-mode, certain techniques to detect hidden processes will also be presented. Certain challenges in porting the memory scanner to 64-bit Windows and Vista will be discussed. The advantages and disadvantages of implementing a memory scanner in user-mode (rather than kernel-mode) will also be discussed.

8 citations


Book ChapterDOI
12 Sep 2010
TL;DR: This paper describes how to implement MPICH2 on Windows and exploit these Windows-specific features while still maintaining large parts of the code common with the Unix version, and presents performance results comparing the performance of MPich2 on Unix and Windows on the same hardware.
Abstract: Commercial HPC applications are often run on clusters that use the Microsoft Windows operating system and need an MPI implementation that runs efficiently in the Windows environment. The MPI developer community, however, is more familiar with the issues involved in implementing MPI in a Unix environment. In this paper, we discuss some of the differences in implementing MPI on Windows and Unix, particularly with respect to issues such as asynchronous progress, process management, shared-memory access, and threads. We describe how we implement MPICH2 on Windows and exploit these Windows-specific features while still maintaining large parts of the code common with the Unix version. We also present performance results comparing the performance of MPICH2 on Unix and Windows on the same hardware. For zero-byte MPI messages, we measured excellent shared-memory latencies of 240 and 275 nanoseconds on Unix and Windows, respectively.

6 citations


Book
24 Jun 2010
TL;DR: The cmd.exe or command prompt is the command-line interpreter on OS/2, Windows CE and on Windows NT-based operating systems (including Windows 2000, XP, Vista, 7, Server 2003 and Server 2008).
Abstract: High Quality Content by WIKIPEDIA articles! cmd.exe or command prompt is the command-line interpreter on OS/2, Windows CE and on Windows NT-based operating systems (including Windows 2000, XP, Vista, 7, Server 2003 and Server 2008). It is the analog of COMMAND.COM in MS-DOS and Windows 9x systems, or of the Unix shells used on Unix-like systems.

5 citations


Journal Article
TL;DR: A enhanced file encryption system design proposal including authentication, eKey module, multi-level protection and key management is proposed based on existing file system filter driver encryption system and offers a enhanced security and reliable solution for file protection.
Abstract: To solve authentication in encryption systems based on file system filter driver, enhance protection control in detail and improve the system security, a enhanced file encryption system design proposal including authentication, eKey module, multi-level protection and key management is proposed based on existing file system filter driver encryption system. Two level authentication included entries and identities are designed. Multi-level file key and key access control are achieved. Solution is implemented based on Windows NT driver model and file system filter driver and eKey module is integrated. A practical application is implemented to prove the feasibility and validity of the proposal. Consequently, the study offers a enhanced security and reliable solution for file protection.

3 citations


01 Jan 2010
TL;DR: This paper uses the library function of Glib and GTK+ in GNOME to get the desktop environment of Linux, and then through the Socket Network programming interface to build a suitable Linux and Windows operating system, cross-platform network communication program.
Abstract: To realize the remote control, need to get real-time images of the screen, in this paper, using the library function of Glib and GTK+ in GNOME to get the desktop environment of Linux, and then through the Socket Network programming interface to build a suitable Linux and Windows operating system, cross-platform network communication program.

2 citations


Proceedings ArticleDOI
02 Apr 2010
TL;DR: The IIS stringent security mechanisms for the establishment of a high-security server have laid a solid foundation, and to explore the IIS security mechanisms, has important significance.
Abstract: Internet Information Server as one of today’s popular server, providing a powerful Internet and Internet service function, it works as the Windows NT family of operating systems to provide a set of services, such as Windows NT Server4.0 and Windows Server 2000 and so on. IIS stringent security mechanisms for the establishment of a high-security server have laid a solid foundation. Therefore, to explore the IIS security mechanisms, has important significance.

2 citations


Journal Article
TL;DR: This paper introduces the implementation methods of network communication between the DOS operating system and Windows operating system, and develops the server and client communication program based on the TCP/IP protocol.
Abstract: Mainly introduces the implementation methods of network communication between the DOS operating system and Windows operating system.Based on the Visual C++ 6.0 environment at the Windows platform,using Class Winsock provided by MFC develop client program.Based on Borland C++ 3.1 environment at the DOS platform,using a development Kit-Wattcp to develop server program,which based on the Packet Driver at DOS platform.DOS operating system lacks Winsock-API similar of Windows so that designing applications based on TCP/IP protocol under the system,you need to install the network adapter driver Packet Driver in DOS operating system,and produced the Makefile in the DOS,put all the source program of Wattcp to compile,link into the library.Adopt the C/S mode,using the socket network programming principles,methods and techniques,implement the client-server network communication,and develop the server and client communication program which based on the TCP/IP protocol.

2 citations



Book ChapterDOI
01 Jan 2010
TL;DR: This chapter summarizes how to deploy Windows 7's Windows XP Mode feature, a virtualization technology that gives end users and administrators the ability to use the new features of Windows 7 while allowing the use of critical and essential applications that may not function correctly on Windows Vista or Windows 7.
Abstract: This chapter summarizes how to deploy Windows 7's Windows XP Mode feature. Windows 7 Professional, Enterprise, and Ultimate support additional features that both administrators and end users can take great advantage of. One of these features is Windows XP Mode. Windows XP Mode is a virtualization technology that gives end users and administrators the ability to use the new features of Windows 7 while allowing the use of critical and essential applications that may not function correctly on Windows Vista or Windows 7. Window XP Mode functions with Windows Virtual PC, which is available for Windows 7 Professional, Enterprise, and Ultimate. Windows Virtual PC is an evolution of Virtual PC 2007, a stand-alone product for previous versions of Windows. Windows XP Mode is a separate download from the Microsoft Web site.

1 citations


Journal Article
TL;DR: The difference of Chinese IME between Windows mobile Standard and desktop Windows is compared, and the input method interface of Windows Mobile Standard is analyzed.
Abstract: Windows Mobile Standard is one of the main mobile phone operating systems.Users have less choice because Windows Mobile Standard only has a few IME.The difference of Chinese IME between Windows Mobile Standard and desktop Windows is compared,and then the input method interface of Windows Mobile Standard is analyzed.A CKC Chinese IME,which runs on Windows Mobile Standard,is designed and implemented.Some of the key technologies are described.It is helpful to migrate a variety of IME from desktop windows to handle device.

Proceedings ArticleDOI
Tony Palomino1
24 Oct 2010
TL;DR: In this paper, the authors developed a strategy for pushing out changes to the Windows environment via Mac OS Radmind tools and applied additional machine-specific changes to Windows upon first boot.
Abstract: In a dual-boot (Mac OS/Windows) lab environment, management of system and application software for the non-preferred operating system (OS) can be a real pain. Our Mac OS was maintained nightly, but our Windows system often went unbooted for weeks at a time. The goal was to make both OSes easily maintainable, providing a consistent user experience from machine to machine.Utilizing an NTFS driver to allow read/write access to the Windows partition, I've developed a strategy for pushing out changes to the Windows environment via Mac OS Radmind tools. Additional machine-specific changes are applied to Windows upon first boot.This paper will illustrate the generalities of how we are now managing our dual-boot computers at Reed College, as well as identify some specific challenges we are currently facing.

Dissertation
01 Jan 2010
TL;DR: This thesis performs research on encryption technologies, describes the features and advantages or disadvantages of the most popular encryption facilities, and also measures and compares the performance penalty of these facilities.
Abstract: Cybercrime is a serious social problem. Data security threats affect not only large financial organizations and government department but also personal computer users. It is very common that laptops or USB drivers are stolen or lost, and private information is leaked as a consequence. Encryption is one method used to ensure data security. During recent years, encryption technology has developed significantly, and there are many encryption facilities available. Even though users do care about their data security, normally they think it is too sophisticated and time-consuming to install and configure encryption facilities. They also worry about encryptionwould affect their system’s performance and other features. As a result, many people do not even try to use the encryption technologies. Others have tried some encryption tools but didn’t like them and then give up. However, users still have the problem of information leakage now. In this thesis, the author performs research on encryption technologies, describes the features and advantages or disadvantages of the most popular encryption facilities, and also measures and compares the performance penalty of these facilities. Furthermore, recommendations are given based on different aspects of users’ requirements. Hopefully, the result of this thesis will be valuable to users who want to use encryption technology and must choose the most suitable facility.

Proceedings ArticleDOI
01 Dec 2010
TL;DR: A synchronized Petri nets model of robot control software is presented, in which an event set is introduced to indicate the start and end of a task module in control software design, suitable for scheduling complex algorithms with large variance in execution time.
Abstract: The verification of new intelligent robotic control algorithm not only requires the correction of computation but also satisfies the timing constraints. In this paper, a synchronized Petri nets model of robot control software is presented, in which an event set is introduced to indicate the start and end of a task module in control software design. With the help of the concept of inhibitor arc, the preemptive scheduling policy with fixed priority is modeled and furthermore, a new approach for dynamic monitoring of duration of a task module and performance evaluation of schedulability is presented. The presented model is applied in the Open Real-time Robot Controller-ORRC-I, developing under the Windows NT environment and a real-time extension RTX is adopted to assure real-time performance of control actions. Experiments of scheduling and synchronization of robotic control tasks prove the effectiveness of presented approach and show it suitable for scheduling complex algorithms with large variance in execution time.


Proceedings ArticleDOI
16 Jul 2010
TL;DR: The test equipment of airplane fire alarm system is developed, an intelligent synthesis test system allowing multiple parameters and digital data acquisition, which has lots of advantages, such as high reliability and adaptability to the operating environment, fine commonality, easy to operate, and highly programmatic and automatic working process.
Abstract: The airplane fire alarm system is a piece of the most important equipment influencing the flight security. Due to the factors of design and working condition, the reliability of the system is poor, especially the high rate of false alarm. So the test equipment of airplane fire alarm system, an intelligent synthesis test system allowing multiple parameters and digital data acquisition, is developed. This system takes embedded industrial control computer as its core, and adopts unit wooden blocks type structure. The software, being programmed by C language, circulating in WINDOWS NT, is designed to manage the software and hardware resource of the entire system. This system has lots of advantages, such as high reliability and adaptability to the operating environment, fine commonality, easy to operate, and highly programmatic and automatic working process.