By Asher Dolev
Code hooking is a type of computer program that actually covers a range of different techniques. These techniques are used to alter the behaviour of an operating system or of the software applications that may be getting used within the operating system. This process works by intercepting the messages or cell functions that are being passed between the different component parts of the software. The code that intercepts this information is known as a hook, hence the name of this process.
This hooking process is used for a range of different purposes, which includes extending the functions and also debugging the system. This system may be used to intercept the events of the mouse or the keyboard prior to them getting to the application.
It is possible for this hooking process to be used in a malicious manner. This process can be used as fake programs and they have the ability to be invisible and this allows them to operate on the back of other programs. The malicious hooking systems are available in two different methods which are commonly known as wallhack and rootkits. These systems work by the hook being inserted into software which is already operating. This hooking system can be used as a tactic prior to the application actually starting.
The process of hooking can take place through a physical form of modification. This form of hooking happens through a style of reverse engineering. This form of hooking tends to be used as a intercepting process in order to replace or monitor them.
Some hooking processes happens through runtime modification and this method involves entering the operating system when it is being operated. This will take place as long as it has been given permission to enter onto the system.
The hooking process that takes place through keyboard events tends to uses Microsoft Windows in order to operate. This process uses the net framework, which is part of Microsoft.
Article kindly provided by UberArticles.com
Topics: Software | Comments Off
MLA Style Citation:
Dolev, Asher "A Manual, For Code Hooking." A Manual, For Code Hooking. 24 Jun. 2010. uberarticles.com. 26 Oct 2014 <http://uberarticles.com/computers-and-technology/software/a-manual-for-code-hooking/>.
APA Style Citation:
Dolev, A (2010, June 24). A Manual, For Code Hooking. Retrieved October 26, 2014, from http://uberarticles.com/computers-and-technology/software/a-manual-for-code-hooking/
Chicago Style Citation:
Dolev, Asher "A Manual, For Code Hooking" uberarticles.com. http://uberarticles.com/computers-and-technology/software/a-manual-for-code-hooking/
Comments are closed.
Uber Articles and its partner sites cannot be held responsible for either the content nor the originality of any articles. If you believe the article has been stolen from you without your permission, please contact us and we will remove it immediately. If you have a problem with the accuracy or otherwise of the content of an article, please contact the author, not us! Also, please remember that any opinions and ideas presented in any of the articles are those of the author and cannot be taken to represent the opinions of Uber Articles. All articles are provided for informational purposes only. None of them should be relied upon for medical, psychological, financial, legal, or other professional advice. If you need professional advice, see a professional. We cannot be held responsible for any use or misuse you make of the articles, nor can we be held responsible for any claims for earnings, cures, or other results that the article might make.