Abstract
ABSTRACT Through API, Windows application can request the aid of the operating system. So, controlling API's call allows getting access and controlling other programs. The idea of this research relies upon the technique of directly manipulating and modifying API code in memory at run time. The research presents software that injects a DLL using Windows hook technique into processes address space. The injected DLL replaces each desired API function with a new function. So, any call made by those processes to the controlled API will cause to call the new replacement function. This technique had been applied on a number of API functions and dealt with files in order to control file manipulation operations which uses programs in the system. Microsoft visual C++ version 6.0 is used by the researcher to develop the software. .