Windows System 32 folder

Posted on 2005-05-11
Last Modified: 2010-03-18
What is held in the Windows System 32 folder?  Why is this location a target for spyware and softeware hackers?  Thanks!
Question by:jfexchange
    LVL 32

    Assisted Solution

    Almost all important Windows system files are in that folder (or subfolders within that), which explains why it is a popular target for hackers. The secondary reasons are that the folder is in the system PATH environment variable, so a program placed there can be executed from any other folder or context without having to specify the full path. Also, that folder has so many windows files that a few extra files can easily go un-noticed.

    All the above assumes you have Windows/NT or later. It does not apply to Win/9x/ME, where the corresponding folder is named \system not \system32.

    LVL 16

    Assisted Solution

    it contains drivers, dlls, help files, control panel applets, MMC console files, and alot of exe's that are Windows services...

    why is it targeted? probably because there's so many files in there that no one would notice an extra one or two. plus, if you're going to rename an existing dll or exe, that's the place to do it.
    LVL 69

    Accepted Solution

    It is the heart and brain of windowsxp and from here is the pulse for all the programs drivers applications that is windows xp. Kinda like the control center. If one of these is altered or controlled by sources it will effect the entire running of the computer. That is why hackers go for here, once an .exe script is run to associate with any system 32 files windows loses control of it.
     What more can one say,
    it is a complete invasion of privacy and removes all choices from windows xp as well as the owner of the computer renderring the machine most often either useless or hijacked and at the control of another. Hense EE and many other sites have been created because of these thieves.
     On a brighter note thanks to these thieves we have all learnt to become outstanding computer tecks making available to all our solutions.. :)

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    IT, Stop Being Called Into Every Meeting

    Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

    Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
    I'm a big fan of Windows' offline folder caching and have used it on my laptops for over a decade.  One thing I don't like about it, however, is how difficult Microsoft has made it for the cache to be moved out of the Windows folder.  Here's how to …
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    9 Experts available now in Live!

    Get 1:1 Help Now