These excerpts, primarily from the second part of a book on Windows 10 System Programming, explore various facets of system-level programming using the Windows API. The text covers diverse topics including memory management, discussing aspects like large pages, address windowing extensions, NUMA, and functions like VirtualAlloc and its variants, alongside concepts such as working sets and heaps. It also addresses Dynamic Link Libraries (DLLs), detailing their construction, linking methods, the DllMain function, and techniques like DLL injection and hooking. Finally, the sources examine Windows security components such as SIDs, tokens, access masks, privileges, security descriptors, and User Account Control (UAC), and touch on the Registry, Pipes and Mailslots for inter-process communication, Services, Debugging and Diagnostics tools like performance counters and ETW, the Component Object Model (COM) for inter-component communication, and the Windows Runtime (WinRT) as a modern evolution of COM.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Windows-10-System-Programming-Part/dp/B09JJJ7QZ4?&linkCode=ll1&tag=cvthunderx-20&linkId=ba3384fceb8c6cecd66b587345343a00&language=en_US&ref_=as_li_ss_tl
Published on 1 week, 3 days ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate