Pages

Jumat, 11 November 2011

输入法引起安全卫士的漏洞及解决方法 Input caused by security guards of the vulnerability and solutions

黎永逸 Li Yongyi

美萍是利用Windows的内核技术,实现了虚拟Win9x桌面,硬盘文件保护,远程记费,限时或定时开关机等等.它的出现给网吧管理带来很大的安全和方便, 但是它并不是绝对的安全,许多有意者处身积虑地寻找它的安全漏洞.... Mei-Ping is the use of the Windows kernel technology, the virtual Win9x desktop, hard drive file protection, remote billing, limit or timer switch, etc. It appears to the Internet cafe management of great safety and convenience, but it is not absolute security, many who find themselves interested in the plot it is considering looking for security vulnerabilities ....

输入法正也引起美萍电脑安全卫士的一个安全漏洞,不知道你是否使用过美萍正保护的机子,我们看到的桌面只是一个虚拟Win9x的桌面,受保护的机子在管理员没有开通之前我们是没法使用这台计算机来进行我们的工作的,如:没法打开浏览器浏览站点或使用OICQ进行聊天,也没法打开硬盘等,但是通过输入法可以绕过美萍的虚拟桌面保护而进行对计算机完全操作的.... Mei-Ping input method is also caused by a security guard computer security vulnerabilities, do not know whether Mei-Ping is used to protect the machine, we see that the desktop is just a virtual Win9x desktop, protected machine is not opened before the administrator we can not use this computer to carry out our work, such as: can not open the browser to browse the site or use OICQ chat, we are unable to open the hard disk, etc., but Mei-Ping through input method to bypass the virtual desktop protection and the full operation of the computer ....

好吧,我们来开始吧! Well, let's get started!

第一步: 在开始菜单中打开"美萍注册"窗口(也可以是"会员登录",只要有输入框就可以). Step one: Open the Start menu, "Mei-Ping registration" window (it can be "Member Login", as long as the input box can be).

第二步: 在输入框里单击鼠标,使鼠标符号处于输入状态符号,然后用"Alt+Shift"(windows默认的输入法切换热键)组合键来切换任一种输入法,如果出现输入状态则在输入状态上点右键后选择"帮助..."(否则随意输入几个字母(或汉字)后再按右键后选择"帮助...").这时弹出一个输入法的"帮助主题" Step two: in the input box, click the mouse, the mouse symbol in the input state symbols, and then use "Alt + Shift" (windows default input method switch hotkey) key combination to switch any of the input, if input state points in the input state on the right and choose "Help ..."( otherwise free to type a few letters (or characters) and then right-click and choose" Help ..."). will pop up an input method "to help theme "

第三步: 双击帮助主题中的"目录"选项卡下面任一个主题的目录后既弹出一个出入法帮助的页面. Step Three: Double-click the Help topic "Directory" tab any theme directory access method not only pop up a help page.

第四步: 用鼠标单击这个帮助窗口使这个窗口处于当前工作状态.然后按"F1"键弹出一个"Windows帮助"窗口. Step four: Use the mouse to click the help window to the window in the current working state and then press the "F1" key to pop up a "Windows Help" window.

第五步: 在"选项"的下拉菜单中选择"按Web 帮助", Step Five: In the "Options" drop-down menu, select "as Web Help",

第六步: 在"Web 帮助"的窗口中点击"联机支持"的链接,这时弹出一个Internet Explorer浏览器了.只要在地址栏中输入要访问的站点(如在地址栏里输入http://www.lyy.ccoo.com)或盘符(如c盘c:\ ),如果美萍电脑安全卫士对硬盘进行保护使我们没法访问某个盘符时可以用按"F3"(windows默认的查找热键)键弹出一个查找窗口后输入你要想打开的文件或文件夹进行查找,找到后即可打开,还有,也可以通过查找网上邻居来访问自己或其它机子设置为共享的资源. Step Six: In the "Web Help" window click on the "Online Support" link, then pops up an Internet Explorer browser. As long as in the address bar to access the site (such as in the address bar enter http:/ / www.lyy.ccoo.com) or letter (such as c drive c: \), Mei-Ping computer if the hard disk protection security guards can not access a drive letter so that we can use the press "F3" (windows default The search key) button brings up a search window you want to open the input file or folder to search, locate and open the can, there, you can also find the Network Neighborhood to access their own or other machine is set to shared resources .

解决方法:由于漏洞的产生是出在“帮助...”上,只要使这一功能不发挥作用就可以,这就是把这一漏洞堵住了.对于“帮助...”选项按钮所对应的是后缀名为“.chm”,并且是“*.hlp”文件所独立的.我在 Solution: Since the production is a vulnerability in the "Help ...", as long as this feature so that you can not play a role, which is blocked to the loophole for "Help ..." option button that correspond to the suffix ". chm", and is "*. hlp" file independent. I

“WIN9x的\HELP”目录下的".hlp"文件。 "WIN9x the \ HELP" directory ". Hlp" file. 将这几个文件从“WINdows\HELP”目录删除或是改名(去掉这些帮助文件对Windows的使用是不影响的)这样漏洞就赌住了. These few files from the "WINdows \ HELP" to delete or rename the directory (remove the use of Windows Help files are not affected) This vulnerability to bet live.

Tidak ada komentar:

Posting Komentar