首页> 外文期刊>MSDN Magazine >Escape from DLL Hell with Custom Debugging and Instrumentation Tools and Utilities, Part 2
【24h】

Escape from DLL Hell with Custom Debugging and Instrumentation Tools and Utilities, Part 2

机译:使用自定义调试和检测工具及实用工具从DLL地狱中逃脱,第2部分

获取原文
获取原文并翻译 | 示例

摘要

Building on his article published in the June issue, which demonstrated several ways to get process and DLL-related information from APIs such as PSAPI, NTDLL, and TOOLHELP32, the author presents some unusual ways to get system-oriented info that you can easily integrate in your own toolkit. There are three tools included as samples: LoadLibrarySpy, which monitors an application and detects which DLLs are really loaded; WindowDump, which retrieves the content and a detailed description of any window; and FileUsage, which redirects console-mode applications to tell you which process is using any opened file.
机译:在6月刊发表的文章的基础上,作者展示了几种从API(例如PSAPI,NTDLL和TOOLHELP32)获取与进程和DLL相关的信息的方法,作者提出了一些不寻常的方法来获取可轻松集成的面向系统的信息在您自己的工具包中。样本中包含三个工具:LoadLibrarySpy,它监视应用程序并检测实际加载了哪些DLL。 WindowDump,检索任何窗口的内容和详细描述; FileUsage和FileUsage,重定向控制台模式应用程序以告诉您哪个进程正在使用任何打开的文件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号