Articles Written by Zhefu Zhang

GUI-Based RunAsEx

Many of you must have heard of a tool called "RunAs" that originated from the WinNT4 Resource Kit; and from Win2K.

Keystroke Logger and More, Part 2

The second article in the "Keystroke Logger and more" series. Learn about the principle of MSN Messenger Hooking in version 5 of MSN and before.

Keystroke Logger and More...

Learn about keystroke logging and related technical topics. The concepts covered include "Interception of Meaningful Strokes Only" (includes password fields), MSN Messenger chat, IE form, Windows Login screen, and the mechanisms of Log detection.

Rendering a Region Dialog From a BMP/JPEG

A flexible and user-friendly Region Dialog that support things to permit the user to render a region from both image resource and images files such as bitmap and JPEG. You can drag and drop to apply new images; press Ctrl+Z to go back through all the images you have used, select the background color on different files, and even zoom the images to any ratio you like. Also includes accessory functionalities such as "Lock Machine," "Shut Down Machine After n Minutes," "Start Screen Saver," and so on.

Top White Papers and Webcasts

  • Employees must exchange sensitive emails with customers and partners. These emails might contain protected health information, protected financial information, or corporate information that should not be made public. Globalscape® Mail Express® allows you to encrypt the emails that it manages so that no one but the sender and recipient--not even the administrator--can view the contents of the email. "Secure the Transfer of Sensitive Emails" is the property of GlobalSCAPE

  • Live Webinar June 2, 2015 - 11 am PST / 2 pm EST Your organization and brand are increasingly digital today, proliferating across websites, media outlets, social networks, search engines, mobile apps, online marketplaces and more. Each digital touch point not only enhances the value of your brand, but also represents far greater risk for your company. They increase opportunities for brand defamation and data leakage; act as discreet places to conspire and collude; and open the door to new security …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date