What is the Library of Dynamic Links?
Dynamic link library is a system used by Microsoft, which allows multiple applications to access the same part of the code in Windows® simultaneously. This is one of the keys to multitasking efficiently. In 2010, the security scientists found that the gap in the way hackers could use the Dynamic Link Library library system. This led to the dilemma over how to fix it without affecting applications of applications. Windows® is an operating system that largely exists for the coordination of the way that individual applications, also known as programs, approach the abilities of the computer. The Windows® itself is ultimately a set of computer code that acts effectively as a book of rules or a wizard of how the applications interact with as hardware. Theionty has access and operates individual parts of the Windows® code. One example would be part of Windows® responsible for printing documents. Most applications must access this feature at a certain point, but afterWhich of each application loads the appropriate code into the computer's memory as soon as the application has started, it would be ineffective use of resources and could cause conflicts.
To solve this Windows® code for a specific function, printing is stored as a small program known as the Dynamic Link Library or DLL. If the user launches an application like a text processor, this file does not open automatically. Instead, the text processor only opens and activates the file as needed, in this case, when the user wants to print the document.
Historically many applications developers simply wrote a code that said the name of the Vant Dynamic Link library called, instead of specifying exactly where it should be placed on the computer. If you want to do this, Windows® has a set system to search for the missing DLL files by searching for a listing list in a defined order. Even if it mOhlo to be theoretically used if the malicious file disguised as a DLL set in the right location, so it was found and opened in front of a legitimate file, it was not considered the main security risk, because hackers would need a physical approach to the machine to introduce a malicious file.
In 2010, it was found that hackers could theoretically obtain such files on site via a remote connection: that is, over the Internet. This meant that dozens of Windows® applications were susceptible to attacks using this method. The Community Security has been divided into whether the applications are rewritten to determine the location of the legitimate DLL file that relying on any developer who has taken steps has changed Microsoft the way Windows® is engaged in such files.