Contents:
Note this won't work if you use the End key on your numeric keypad. You must use the real End key. On some laptops like mine you must press Fn to access the End key on PgDn.
Zypher 34k 4 44 Thanks -- this is just what I needed. Mouse avoidance isn't necessarily "weird" for a Windows admin? You learn keyboard shortcuts real quick in those scenarios. Just whilst everyone is reminiscing: One option is to use the on-screen keyboard from within the first RDP session. You can press Ctrl-Alt-Del virtually, holding ctrl-alt on the top-level machine and clicking the 'del' in the desired level OSK.
Would you like to answer one of these unanswered questions instead? Home Questions Tags Users Unanswered. Does it improve security in any way, and if so, how?
Cole Johnson 2 Count Zero 1, 3 13 So TSR applications like Sidekick or other tools could magically pop up when you pressed the right combination. The explanation at the time no, this was years ago and before the WWW was invencted, I can't provide a link was that Ctrl-Alt-Del was the only key combination an application could not intercept, it was reserved by DOS. So a malicious application could not intercept it and popup a fake login page. Here's what Bill Gates himself had to say about it , which sounds like he's trying to describe what Adnan has answered, to what is perhaps a non-technical audience, before giving up: As a side note: The interrupt was, historically, triggered by the BIOS' keyboard handler routine, but these days it's less clear cut.
The interrupt is mapped to an ISR which is executed at ring0, which triggers the OS's internal handler for the event. Offler Those customisations were installed as administrator.
The UAC warning seems also to be only something to click away. ATM have just a dialog that looks like the annoying java thing and most people will blindly click update While Winlogon itself has customization hooks that can be used to present a different ui, read a smartcard, support a 2-factor keyfob, and so forth, the point remains that those hooks can only be installed by a suitably privileged user.
The things Offler described are all easily done with those hooks, and were certainly installed by an administrator, possibly through a customized system installation kit.
Thomas Pornin k 51 Hang on a second. And malware that does the same thing? D3C4FF Just because you can't intercept the message does not mean you can't tell windows what to do when it receives the message.
ScottChamberlain ah quite right. I missed the administrative rights part there. That's why backdooring keyboards makes sense d: To quote the accepted answer by Oskar Duveborn, The Windows NT kernel is designed to reserve the notification of this key combination to a single process: TildalWave 10k 8 38 Good additional detail here, though. The idea of using an "interrupt any running application" key as the cue for a log-in prompt predates Windows by quite awhile. You used three whole fingers? Here's a picture of me doing it with just two fingers on one hand!
This answer is correct - although it has no relevance in the security. Originally it was designed for debugging purposes by the Intel team and was never intended to be used by users. If this setting is enabled, you can quit the applications.
The Old New Thing. Retrieved 19 September Technology of a Knucklehead. Retrieved from " https: CS1 German-language sources de Use dmy dates from August Articles needing additional references from July All articles needing additional references.
Views Read Edit View history. In other projects Wikimedia Commons. This page was last edited on 28 November , at By using this site, you agree to the Terms of Use and Privacy Policy. Perform a soft reboot without memory initialization by jumping to IPL reset vector , [3] [4] [5] [15] after broadcasting a pending shutdown event on AT compatible machines. Perform a soft reboot without memory initialization by jumping to IPL reset vector, after broadcasting a pending shutdown event on AT compatible machines [4] [5] [34] and flushing disk caches since DOS 6, or with FreeKEYB [15] [35] [36] loaded.
Some memory managers e. QEMM can intercept and turn this into a quick reboot. Perform a soft reboot with memory initialization aka "cold reboot" by jumping to IPL reset vector, after broadcasting a pending shutdown event on AT compatible machines and flushing disk caches. Perform a hard reboot by triggering the chipset's reset logic, after broadcasting a pending shutdown event and flushing disk caches.
Performs a soft reboot if pressed twice. Bring up "Close Program" dialog box a simplistic task manager. Bring up the Windows Task Manager. Brings up the login screen secure attention sequence After logon: Before logon when not using Network Level Authentication: Brings up Windows Security.
Perform soft reboot without memory initialization warm boot [38].