... Hyperthreading is a technology introduced by Intel that provides many logical processors on one physical processor. Each logical processor has its CPU state, but the execution engine and onboard cache are ... the script: 1. C: \>cscript osversion.vbs 2. Microsoft (R) Windows Script Host Version 5.7 3. Copyright (C) Microsoft Corporation. All rights reserved. 4. Caption: Microsoft Windows Vista 5. ... decisions to occur in parallel on multiple processors. Multiprocessor thread scheduling details are covered in Chapter 5. Further details on multiprocessor synchronization can be found in Chapter
Ngày tải lên: 18/10/2013, 00:15
... HAL use this information to perform architecture-specific and machine-specific actions. Portions of the PCR and PRCB structures are defined publicly in the Windows Driver Kit (WDK) header file ... operating system code executes. Each processor’s IRQL setting determines which interrupts that processor can receive. IRQLs are also used to synchronize access to kernel-mode data structures. (You’ll ... I/O bus to change IRQLs, such as for PIC and 32-bit Advanced Configuration and Power Interface (ACPI) systems, implement a performance optimization, called lazy IRQL, that avoids PIC accesses. When
Ngày tải lên: 20/10/2013, 20:15
Windows Internals covering windows server 2008 and windows vista- P4
... implements a create file service for its file objects, and the process manager implements a create process service for its process objects. Although a single create object service could have been ... handle containing CheckForOtherInstanceMutex 2 Right-click on the handle, and select Close Handle Confirm the action when asked 3 Now run Windows Media Player again Notice that this time a second ... might also contain a pointer to the exclusive process that allows access to this object if the object was created with the exclusive object flag. Also, this subheader does not necessarily contain
Ngày tải lên: 20/10/2013, 20:15
Windows Internals covering windows server 2008 and windows vista- P5
... kernel can use atomic CPU instructions to perform these tasks (lock cmpxchg is used, which atomically compares and exchanges the old lock with a new lock). If the atomic compare and exchange ... object manager functionality can be applied to a critical section. Two processes cannot use the same critical section to coordinate their operations, nor can duplication or inheritance be used. Condition ... pushlock for each processor in the system and associating it with the cache-aware pushlock. When a thread wants to acquire a cache-aware pushlock for shared access, it simply acquires the pushlock
Ngày tải lên: 24/10/2013, 18:15
Windows Internals covering windows server 2008 and windows vista- P6
... versions. When KPP detects a change in any of the structures mentioned (as well as some other internal consistency checks), it crashes the system with code 0x109—CRITICAL_STRUCTURE_CORRUPTION. For third-party ... Windows Server 2008, they also have the ability to block process launch. ■ Object manager filtering (explained in the object manager section earlier). Security software can remove certain access ... user In Windows, such processes are called services or Windows services, because they rely on the Windows API to interact with the system Services are similar to UNIX daemon processes and
Ngày tải lên: 24/10/2013, 18:15
Windows Internals covering windows server 2008 and windows vista- P7
... service is not configured with the wrong account, such as a LocalService account, but with an image path pointing to a running Svchost, such as netsvcs, which runs as LocalSystem). A service’s ... service’s process in the local system account’s security context but connects the service with WinSta0 instead of the noninteractive service window station. On versions of Windows prior to Windows ... objects specific to the Windows environment Because all operating systems store data in files, the CIM common model includes the CIM_LogicalFile class The CIM_DataFile class inherits the CIM_LogicalFile
Ngày tải lên: 29/10/2013, 01:15
Windows Internals covering windows server 2008 and windows vista- P9
... utility in Control Panel (or right-click on your computer name’s icon on the desktop, and choose Properties). Click the Advanced System Settings label, select the Advanced tab, click the Settings ... desktop, and choose Properties). Click the Advanced System Settings label, select the Advanced tab, click the Settings button in the Performance section, and finally click the Advanced tab. Be ... select , and then click Search. Scroll down until you see Notepad thread 0. Click it, click the Add button, and then click OK. 7. As in the previous experiment, select Properties from the Action
Ngày tải lên: 08/11/2013, 00:15
Windows Internals covering windows server 2008 and windows vista- P10
... Discretionary access control list (DACL) Specifies who has what access to the object. ■ System access control list (SACL) Specifies which operations by which users should be logged in the security ... !process command, as shown here: 1. lkd> !process d 6c 1 2. Searching for Process with Cid == d 6c 3. PROCESS 85450508 SessionId: 1 Cid: 0d 6c Peb: 7ffda000 ParentCid: 0ecc 4. DirBase: cc9525e0 ... the caller is high enough to access the resource, based on the resource’s own integrity level and its mandatory policy ■ The discretionary access check, which determines the access that a specific
Ngày tải lên: 08/11/2013, 00:15
Windows Internals covering windows server 2008 and windows vista- P11
... The Windows command prompt (%SystemRoot%\System32\Cmd.exe) enforces it for batch file execution. ■ Windows Scripting Host components that start scripts—%SystemRoot%\System32\Cscript.exe (for command-line ... EXPERIMENT: Watching Software Restriction Policy enforcement You can indirectly see Software Restriction Policies being enforced by watching accesses to the registry when you attempt to execute an image ... secpol.msc to open the Local Security Policy Editor, and navigate to the Software Restriction Policies node. 2. Choose Create New Policies from the context menu if no policies are defined. 3. Create
Ngày tải lên: 08/11/2013, 00:15
Tài liệu Windows Internals covering windows server 2008 and windows vista- P12 doc
... know which driver caused this issue, there isn’t much you can do—a system reboot is necessary because Windows can never safely assume it is okay to ignore the fact that cancellation hasn’t occurred ... application has actively servicing client requests, is controlled with the aid of the system. When an application creates a completion port, it specifies a concurrency value. This value indicates ... processing). The IoCompletion Object Applications use the IoCompletion executive object, which is exported to Windows as a completion port, as the focal point for the completion of I/O associated with
Ngày tải lên: 15/12/2013, 11:15
Tài liệu Windows Internals covering windows server 2008 and windows vista- P13 docx
... applications These include Iscsicli.exe, a command-line tool for managing iSCSI device connections and security, and the corresponding Control Panel application. Some vendors produce iSCSI adapters ... device objects that Windows applications interact with—including COM and parallel ports—as well as disks. Because disk objects actually reside in other subdirectories, Windows uses symbolic links ... advantages of the GPT scheme include the fact that it uses cyclic redundancy checksums (CRC) to ensure the integrity of the partition table, and it maintains a backup copy of the partition table.
Ngày tải lên: 15/12/2013, 11:15
Tài liệu Windows Internals covering windows server 2008 and windows vista- P14 ppt
... control access to its own internal data structures, such as spinlocks. (Synchronization objects are discussed in Chapter 3.) Systemwide resources to which the memory manager must synchronize access ... Microsoft Corp. 3. Contents of shadow copy set ID: {dfe617b7-ef2b-4280-9f4e-ddf9 4c2 ccfac} 4. Contained 1 shadow copies at creation time: 8/27/2008 1:59:58 PM 5. Shadow Copy ID: {f455a794-6b 0c- 49e4-9ae5-e54647fd1f31} ... and process memory utilization. Throughout the chapter, we’ll include references to specific performance counters that contain information related to the component being described. We’ve included
Ngày tải lên: 15/12/2013, 11:15
Tài liệu Windows Internals covering windows server 2008 and windows vista- P15 pdf
... (IMAGE_DLL_CHARACTERISTICS_DYNAMIC_BASE), typically specified by using the /DYNAMICBASE linker flag in Microsoft Visual Studio, and contains a relocation section will be processed by ASLR. When such ... as per-processor stacks called DPC stacks We have already described how the stack can be used to generate stack traces and how exceptions and interrupts store structures on the stack, and ... locates the page directory for the current process. On each process context switch, the hardware is told the address of a new process page directory by the operating system setting a special CPU
Ngày tải lên: 15/12/2013, 11:15
Tài liệu Windows Internals covering windows server 2008 and windows vista- P16 pptx
... physical pages by “color,” their location in the processor CPU memory cache. Windows attempts to minimize unnecessary thrashing of CPU memory caches by using different physical pages in the CPU cache. ... driver that calls MmAllocatePagesForMdl or MmAllocatePagesForMdlEx, by a Windows application that calls AllocateUserPhysicalPages or AllocateUserPhysicalPagesNuma, or when an application allocates ... physical memory. 9.14 Physical Memory limits Now that you’ve learned how Windows keeps track of physical memory, we’ll describe how much of it Windows can actually support. Because most systems access
Ngày tải lên: 15/12/2013, 11:15
Tài liệu Windows Internals covering windows server 2008 and windows vista- P17 pdf
... The cache manager is invoked by a file system through the copy interfaces (the CcCopyRead and CcCopyWrite paths). To process a CcFastCopyRead or CcCopyRead read, for example, the cache manager creates ... mapping and pinning interfaces used to access metadata directly in the cache, the cache manager provides a third interface to cached data: direct memory access (DMA). The DMA functions are used to read ... methods for accessing cached data, each intended for a specific situation: ■ The copy method copies user data between cache buffers in system space and a process buffer in user space. ■ The mapping
Ngày tải lên: 15/12/2013, 11:15
Tài liệu Windows Internals covering windows server 2008 and windows vista- P18 pdf
... object manager, the component of Windows that manages all executive-level objects. (The object manager is described in the section “Object Manager” in Chapter 3.) An application creates and accesses ... which allow it to access any secured object by overriding the object’s security settings. NTFS includes a facility called Encrypting File System (EFS), which users can use to encrypt sensitive data. ... are no Windows functions for creating reparse points. Instead, processes must use the FSCTL_SET_REPARSE_POINT file system control code with the Windows DeviceIoControl function. A process can query
Ngày tải lên: 15/12/2013, 11:15
Tài liệu Windows Internals covering windows server 2008 and windows vista- P19 doc
... includes SSL support so that applications can exchange data over secure HTTP connections The API includes server- side caching... providing cookie persistence, automatic dial-up services, client-side ... process. As described earlier, Windows lets you encrypt a file in two ways: by using the cipher command-line utility or by checking the Encrypt Contents To Secure Data check box in the Advanced ... which is included with Windows, uses both AcceptEx and TransmitFile Windows also supports a handful of other, multifunction APIs, including ConnectEx, Discon nectEx, and TransmitPackets ConnectEx
Ngày tải lên: 15/12/2013, 11:15
Tài liệu Windows Internals covering windows server 2008 and windows vista- P20 pdf
... ICMP, and IGMP. To support legacy protocols such as NetBIOS, which make use of the deprecated TDI interface, the network stack also includes a component called TDX, which creates device objects ... represent various TDI client–accessible protocols: \Device\Tcp6, \Device\Tcp, \Device\Udp6, \Device\Udp, \Device\Rawip, and \Device\Tdx. eXPeriMeNT: Looking at TCP/iP’s Device Objects Using the kernel ... [...]... which is available with Windows Server with the Routing and Remote Access service, allows remote access clients to connect to remote access servers and access 962 Please purchase
Ngày tải lên: 15/12/2013, 11:15
Tài liệu Windows Internals covering windows server 2008 and windows vista- P21 pptx
... not load driver @battery.inf,%acpi\acpi0003.devicedesc%; Microsoft AC Adapter 31. Did not load driver @battery.inf,%acpi\pnp 0c0 a.devicedesc%;Microsoft ACPI-Compliant Control 32. Method Battery 33. ... \Windows\ winsxs\Backup directory, in which Windows places copies of many system files for access by Windows Resource... is through the Windows Modules Installer service, which can run under ... into the Windows Recovery Environment, choose the Command Prompt option, and then execute the bootrec /fixmbr command. This command replaces the executable code in the MBR. Boot Sector Corruption
Ngày tải lên: 15/12/2013, 11:15
Tài liệu Windows Internals covering windows server 2008 and windows vista- P22 doc
... directory. The size of the cache directory and the list of files copied to the cache cannot be modified. To recover a file from the cache directory, you can use the System File Checker (Sfc.exe) ... KeBugCheckEx calls any registered device driver bugcheck callbacks (registered by calling the KeRegisterBugCheckCallback function), allowing drivers an opportunity to stop their devices. It then calls ... WRP copies files that are needed to restart Windows to the cache directory located at \Windows\ winsxs\Backup. Critical files that are not needed to restart Windows are not copied to the cache
Ngày tải lên: 24/12/2013, 17:15
Bạn có muốn tìm thêm với từ khóa: