In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >
Share
Shulou(Shulou.com)06/03 Report--
This article mainly introduces how to use scripts and batch processing to remove traces from the computer, which has a certain reference value. Interested friends can refer to it. I hope you will gain a lot after reading this article. Let's take a look at it.
1. Possible leak points and their existing locations
There are two places where our secrets may be revealed in Windows: one is in the folder, the other is in the registry.
1. Folder: the files we have browsed will be displayed in the documents on the start menu. If they are exposed, our secret will be lost and should be deleted. " The contents of the documents are placed in the C:\ Windows\ Recent folder; the temporary files generated when you install the program and edit the files are placed in the c:\ windows\ temp folder; when the files are deleted, the files are not really deleted and saved in the Recycle Bin, and the things in the Recycle Bin are stored in the C:\ RECYCLED folder (implied) When you browse the website on the Internet, Windows will keep the pages you have seen in the C:\ WINDOWS\ History and C:\ Windows\ Temporary Internet Files folders; inadvertently, Microsoft will get you some cookies from the Internet and put them in C:\ WINDOWS\ Cookies.
two。 Registry: the address of the website that has been entered and the "real name of the network" that was later born in the address bar of IE browser.
In fact, the Windows registry itself is a big garbage warehouse, in which there is garbage, you can find it when you have time. This article only points out one or two points here, and is intended to guide you to follow the analogy and know how to remove the places in the registry that may cause us to disclose secrets.
We know that using the Windows operating system to open files, enter various passwords or chat with friends on QQ can lead to the disclosure of personal secrets and leave traces on the machine. For safety reasons, if you are on a public computer, you should erase the traces left by these operations when you leave. Here are the possible leak points and solutions.
In fact, the Windows registry itself is a big garbage warehouse, in which there is garbage, you can find it when you have time. This article only points out one or two points here, and is intended to guide you to follow the analogy and know how to remove the places in the registry that may cause us to disclose secrets.
Second, specific examples
Two files are used to achieve this function, the VBS script file reg.vbs (you can define your own file name) and the batch file reg.bat (you can define your own file name).
The 1.VBS script file is as follows:
Dim WSHShell
Set WSHShell=WScript.CreateObject ("WScript.Shell")
WSHShell.RegWrite "HKLM\ Software\ Microsoft\ Windows\ CurrentVersion\ Run\ reg", "reg.vbs"
WSHShell.RegWrite "HKLM\ Software\ Microsoft\ Windows\ CurrentVersion\ RunOnce\ deldel", "reg.bat"
WSHShell.RegWrite "HKCU\ Software\ Microsoft\ Internet Explorer\ Main\ Start Page", "about:blank"
WSHShell.RegWrite "HKCU\ Software\ Microsoft\ Internet Explorer\ TypedURLs\", ""
WSHShell.RegDelete "HKCU\ Software\ Microsoft\ Internet Explorer\ TypedURLs\"
WSHShell.RegWrite "HKCU\ Software\ Microsoft\ Internet Explorer\ TypedURLs\", ""
WSHShell.RegWrite "HKCU\ Software\ 3721\ InputCns\", ""
WSHShell.RegDelete "HKCU\ Software\ 3721\ InputCns\"
WSHShell.RegWrite "HKCU\ Software\ 3721\ InputCns\", ""
The first two behaviors of this script define variables, please write according to them. Starting from the third line, it is the processing of the registry. The third line and the fourth behavior add the process file that runs automatically when the computer starts up in the registry, one is that the script itself is reg.vbs, and the other is the reg.bat batch file. The fifth behavior restores the IE start page to "about:blank"; the sixth, seventh and eighth actions remove the web address names that have been viewed in the IE browser address bar; and the ninth, tenth and eleventh actions clear the network real names in the IE address bar.
Here, readers need to master the following points:
1) here we take advantage of the VBS scripting language, and the VBScript code is executed locally through Windows Script Host interpretation. The execution of VBS is inseparable from Windows script host (WSH). WSH is a language-independent script interpretation mechanism based on 32-bit Windows platform provided by Microsoft, which enables scripts to run directly from the Windows desktop or command prompt. With WSH, users can manipulate WSH objects, ActiveX objects, the registry, and file systems. Under Windows2000, you can also use WSH to access the Windows NT active Directory service. WSH relies on the Visual Basic Script and Jscript scripting engines provided by IE3.0 and above, so you can install WSH only after you install IE3.0 and above.
Thank you for reading this article carefully. I hope the article "how to use scripts and batches to remove traces from a computer" shared by the editor will be helpful to everyone. At the same time, I also hope that you will support and pay attention to the industry information channel. More related knowledge is waiting for you to learn!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.