Current location - Recipe Complete Network - Catering franchise - About desktop.ini folder.htt
About desktop.ini folder.htt
Shallow analysis of Desktop.ini file of some wonderful uses

Published: 2004-12-30 20:59:28 Author: Wen/Ah Xiong Font:Large Medium Small Print this page

Entertainment/funny/sports video free to watch! MMS/SMS development platform Free test your IT potential! Meping bath, catering management system

Do you remember the famous "Happy Hour" virus? Infected with the virus on the hard disk will have more than one Desktop.ini and Folder.htt files, even if you delete the directory of these two files, when you open the directory again, they appear like a ghost.

Let me ask you another question related to this: what is the most duplicate file in Windows? The answer is the Desktop.ini file! This file is found in the Windows directory and the Favorites, System, Fonts, Tasks folders under it! It is the presence of this file that makes them different from ordinary folders in appearance or otherwise as well. Below I will talk about some of the marvelous uses of these two files.

One, add a password to the folder

In the school's computer room and campus network management, whether it is often encountered in this case: some computers are often mistakenly deleted by students in the Windows directory or SYSTEM directory of some of the system files can not be caused by the normal startup. Is there a way to protect Windows and other important directories? There is a way, we just need to make the necessary changes in this Folder.htt file, you can change the way the folder is opened. For example, to open the folder before the security certification, you can modify this Folder.htt.

In the Windows folder in the C disk to find Folder.htt file (the file for the hidden files, and later edited with the author *** with the verification of the file of different system content is not the same in this paper kind of main Windows 98), open the Folder.htt file. Find the following content:

Show file." ;

Change this to:

onBlur=' ShowWinStat(winStat); return true;'>Enter password." ;

(2) find function ShowFiles() {

Info.innerHTML = L_Intro_Text + "<br><br>" + L_Prompt_Text;

showFiles = true;

document .all.FileList.style.display = "";

document.all.Brand.style.display = "none";

FixSize();

}

Modified to: ★function ShowFiles()

{var password=prompt("Please enter your password:","");

if (password=="Your password"){Info.innerHTML = L_Intro_Text + "<br><br>" + L_Prompt_ Text;

showFiles = true;

document.all.FileList.style.display = "";

document.all.Brand.style.display = "none";

FixSize(); }

else{alert("Warning, wrong password! You are not authorized to browse this directory");}}

(3) Save the modified Folder.htt file and exit the Windows folder.

After completing the above steps, when you enter the Windows directory again, you are prompted to enter a password, and only if you enter the correct password can you proceed to the directory. By modifying the code that opens the behavior, you can achieve a simple encryption of a directory.

Of course, this kind of encrypted directory is easy to unlock: opening the folder without using the Web, avoiding the execution of the program, or accessing the folder directly from DOS can bypass the entry of the password.

If you're using Windows 2000, you can find

Then add the following code after it:

var pass =prompt("enter the password")

if (pass!="password")

{window. location="d:"}

Then you can add an access password to the folder! This gives your folder an extra layer of protection.

Second, the protection of any folder and hard disk partition

According to the same principle, we can set any folder and hard disk partition protection today. The specific steps are as follows:

(1) Open the folder or hard disk partition to be encrypted, select the "View ?ú Custom Folder" in the File menu.

(2) in the open "Custom Folder" window, as shown in Figure 1, select "Create or edit HTML documents", click the "Next" button, then Click the "Next" button, close the Notepad editing window, click "Finish" button. Find the Folder.htt file in the Windows directory on the C drive, copy it to the current folder, and overwrite the original Folder.htt file.

(3) Open the Folder.htt file and find ★var L_Intro_Text= "<b><font color=red>Warning</font></b><br><br>Modifying the contents of this folder may cause the program to run incorrectly." ; ★ (warning content), change it to "Customized content". After completing the modification of Folder.htt, you need to provide the correct password to access the corresponding folder or hard disk partition, otherwise the contents of the folder cannot be displayed.

Figure 1

(a), the use of folders to install Trojan

Hackers can use the folder to install Trojan, the purpose of which is that the other side as long as you open a folder automatically install Trojan files. Know your enemy and know yourself, let us understand the principles and methods.

Figure 2

[page]

1. First in the directory to create a folder under the folder test folder, into the folder just built test click on the "Tools" menu to select the "Folder Options" items (Figure 2); out of the Folder Options dialog box as shown (Figure 3), the "Hide protected operating system files (recommended)" in front of the "√", and then a warning window, as shown (Figure 4), directly click on the Click "Yes". And then the "hidden files and folders" under the choice of "show all files and folders", and finally click OK in this directory appeared in the Folder settings hidden folder and Desttop.ini hidden file as shown in Figure (Figure 5). Figure 5.)

Figure 3

Figure 4

Figure 5

2. Now click on the "View" menu to select the "Customize Folder" item (Figure 6), the "Customize Folder" window opens. Folder" window, select the "Create or edit HTML documents", click the "Next" button, and then click the "Next" button! Click "Next" button, then click "Next" button, then close the notepad editing window, click "Finish" button, the folder is set to open the folder according to the WEB way. Then open the folder where you want to put the Trojan horse, we will test in this folder. folder.Htt is the template file of the folder, now we modify the template file of the folder, and insert the code of the auto-run program on one end:

Figure 6

It's the test.exe in this paragraph that is the Trojan horse file that you want to install, and I'm running LC4 here in order to show the effect to you.

3. We want to run the test.exe file also copy to this folder, well, we now view the file to modify the properties back, is the reverse process of step 1.

4. OK, if you do not want the Trojan horse to run immediately, please close the window directly, and wait for the administrator to run it. Let's take a look at the effect, exit the test folder and then double-click the test folder icon, as shown in the figure (Figure 7), how about running it, we can test.exe into a smaller Trojan horse, so that the other party does not know in the case of Trojan horse installed for themselves. In fact, if you want to have any file to hide, you can put folder.htt and the same directory, the folder attributes set back after the search can not find this file.

Figure 7

Third, the summary

Well, Folder.htt and Desktop.ini file of good applications and need to pay attention to have spoken, is not to feel very interesting is also very scary Oh! Now let's talk about prevention and solutions:

1. View the folder, remove the "Web page way" option. Although we can not see any personalized directory, but we get is safe, I think it is worth! However, please note that, if you do not use the "WEB way" to view the folder before the introduction of the skills and applications can not be displayed properly, there are gains and losses ah.

2. If there is no need, remove the default *** enjoy and *** enjoy the catalog. If you need to, the public *** user should also add a password, which is only known to insiders. As long as you can upload files, your machine is dangerous. In addition to the methods above, you can also use MIME exploits, ASP exploits to invade, and in the case of Windows 98 there are ****enjoyment methods. So be sure to keep it in check!

3. A major feature of scripting viruses is the use of WSH. If the server is best to remove the WSH, so that many scripting viruses can be low. The method is: in the "Control Panel" select "Add / Remove Programs", select "Windows Installer" in the attachment, and then select the "Windows Scripting Host" in "Details" to uninstall it.