Process Hacker is a free and open source process viewer and memory editor with unique features such as a Regex memory searcher and a powerful run-as tool. It can show services, processes and their threads, modules, handles and memory regions.
HI,
i want to be a white hacker(those who use their skills in ethical hacking)
for that what all languages do i need to know
i am working in an IT company and its paying me well, i just want to learn it because it has always attracted me..i know c,c++,shell,little bit html what else do... (13 Replies)
I want to kill a process of xterm that is run by hacker with my login name.
So, I write a shell script to do my goal.
I run 2 xterm and then I run my script on a first xterm. it should kill the process of a second xterm but it doesn't.Why?
Here is my code :
#!/bin/ksh
myps=$(ps -f|grep... (7 Replies)
hello all, first of all i'm not sure this is correct place to post but i could not find a place about certificates and exams so this seemed most appropriate.
i'm interested in CEH if it's any good and where to take exams, and any books you can forward me to. i do have one book but it's couple... (3 Replies)
getpid(2) System Calls Manual getpid(2)NAME
getpid(), getpgid(), getpgrp(), getpgrp2(), getppid() - get process, process group and parent process ID.
SYNOPSIS DESCRIPTION
These functions return process, process group and parent process IDs, as follows:
Process group ID of the specified process.
If pid is zero, the call applies to the calling process. Same result as
Process group ID of the calling process.
Process group ID of the specified process.
If pid is zero, the call applies to the calling process. Same result as
Process ID of the calling process.
Parent process ID of the calling process.
If the parent process is the initialization process (known as the call returns 1.
Security Restrictions
The system call is subject to compartmental restrictions. See compartments(5) for more information about compartmentalization on systems
that support that feature.
Compartmental restrictions can be overridden if the process possesses the privilege (PRIV_COMMALLOWED). Processes owned by the superuser
may not have this privilege. Processes owned by any user may have this privilege, depending on system configuration. See privileges(5)
for more information about privileged access on systems that support fine-grained privileges.
RETURN VALUE
The functions return the following values:
Successful completion.
n is a nonnegative process ID, as described above.
Failure:
and only. is set to indicate the error.
ERRORS
If or fails, is set to one of the following values:
[EPERM] The current process and pid are not in the same session (see setsid(2)).
[ESRCH] No process can be found corresponding to that specified by pid.
AUTHOR
and were developed by HP, AT&T, and the University of California, Berkeley.
SEE ALSO exec(2), fork(2), setpgid(2), setsid(2), signal(5).
STANDARDS CONFORMANCE getpid(2)