Introduction - If you have any usage issues, please Google them yourself
API calls interception is the task that all boasting you to get access to some parts of others prog rams. Lots of programmers spend time developin g and describing various methods that allow tha t access. Such methods are used in many anti-vir us and anti-spyware applications. Besides, sometimes, intercepting can help you to find errors in your application. However, it is not a secret that some viruses use it too. I s pent much time finding and understanding the te TECHNIQUE of interception. I would like to descri be the results of my research.
Packet : 89346484hooksrc.zip filelist
dllhookapi/
dllhookapi/dllhookapi.cpp
dllhookapi/dllhookapi.def
dllhookapi/dllhookapi.sln
dllhookapi/dllhookapi.vcproj
dllhookapi/Release/
dllhookapi/stdafx.cpp
dllhookapi/stdafx.h
HookDemo/
HookDemo/HookDemo.cpp
HookDemo/HookDemo.sln
HookDemo/HookDemo.vcproj
HookDemo/Monitoring.cpp
HookDemo/Monitoring.h
HookDemo/Release/
HookDemo/stdafx.cpp
HookDemo/stdafx.h
NTProcDrv/
NTProcDrv/DrvUtils.c
NTProcDrv/DrvUtils.h
NTProcDrv/NTProcDrv.c
NTProcDrv/NTProcDrv.dsp
NTProcDrv/NTProcDrv.dsw
NTProcDrv/NTProcDrv.h
NTProcDrv/NTProcDrv.vcproj
NTProcDrv/Release/
NTProcDrv/Undocumented.h
readme.txt