Articles Written by Zhefu Zhang

GUI-Based RunAsEx

Many of you must have heard of a tool called "RunAs" that originated from the WinNT4 Resource Kit; and from Win2K.

Keystroke Logger and More, Part 2

The second article in the "Keystroke Logger and more" series. Learn about the principle of MSN Messenger Hooking in version 5 of MSN and before.

Keystroke Logger and More...

Learn about keystroke logging and related technical topics. The concepts covered include "Interception of Meaningful Strokes Only" (includes password fields), MSN Messenger chat, IE form, Windows Login screen, and the mechanisms of Log detection.

Rendering a Region Dialog From a BMP/JPEG

A flexible and user-friendly Region Dialog that support things to permit the user to render a region from both image resource and images files such as bitmap and JPEG. You can drag and drop to apply new images; press Ctrl+Z to go back through all the images you have used, select the background color on different files, and even zoom the images to any ratio you like. Also includes accessory functionalities such as "Lock Machine," "Shut Down Machine After n Minutes," "Start Screen Saver," and so on.

Top White Papers and Webcasts

  • On-demand Event Event Date: January 28, 2015 Check out this webcast and join Jeff Sloyer, IBM Developer Evangelist and Master Inventor, for a tutorial for building cloud-based applications. Using IBM's platform as a service, Bluemix, Jeff will show you how to architect and assemble cloud-based applications built for cloud scale. Leveraging the power of microservices, developers can quickly translate monolithic applications to a cloud-based microarchitecture. This hour-long session introduces the concepts and …

  • Enterprise endpoint backup can satisfy data collection and preservation requirements in a more streamlined and cost-effective manner than traditional e-discovery methods. Enterprise IT teams face increasing challenges as the amount of valuable data living on endpoints continues to grow. Due to the exploding volume, mobility and compliance requirements of enterprise data, the need to collect and preserve that data for the purpose of e-discovery becomes more critical--and more difficult. Traditionally, …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date