Hello,
After playing around in a Windows XP VM, I noticed a very peculiar type of BSOD that I like to call a CBSOD due to it only occuring with bugcheck codes that start with a C. From NT 3.1 all the way to Windows 7, it basically looked like this:
Unlike the normal XP-7 BSOD, this one is...
bsod
bsod variation
bugcheck
c errors
corruption
error codes
file issues
research
system issues
technicaldetails
troubleshooting
user friendly
vm issues
windows 11
windows 7
windows 8
windows history
windows nt
windows xp
Original release date: October 14, 2021
Summary
Immediate Actions WWS Facilities Can Take Now to Protect Against Malicious Cyber Activity
• Do not click on Link Removed.
• If you use RDP, secure and monitor it.
• Use Link Removed.
• Use Link Removed.
Note: This advisory uses the MITRE...
Original release date: September 16, 2021
Summary
This Joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 8. See the ATT&CK for Enterprise for referenced threat actor tactics and for techniques.
This joint advisory is...
Windows Insiders, Today we’re releasing our first Insider build for Windows 11, and we’re looking forward to the insight that comes from you installing and using on a variety of your PCs. Last week’s introduction of Windows 11 signaled the first step on our journey to empower people with the...
compatibility
debugging
device support
feedback
insider program
memory
oem
pc health check
performance
processor
reliability
security
storage
system requirements
technicaldetails
update
user experience
virtualization
windows 11
windows update
Original release date: May 11, 2021
Summary
This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques.
The Cybersecurity and Infrastructure Security...
access control
backup
business resilience
cisa
critical infrastructure
cybersecurity
dark side
encryption
fbi
incident response
malware
mitigation
network segmentation
phishing
prevention
ransomware
security
technicaldetails
threat actors
user training
Original release date: December 17, 2020
Summary
This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 8 framework. See the ATT&CK for Enterprise version 8 for all referenced threat actor tactics and techniques.
The Cybersecurity and Infrastructure...
Original release date: September 14, 2020
Summary
The Cybersecurity and Infrastructure Security Agency (CISA) has consistently observed Chinese Ministry of State Security (MSS)-affiliated cyber threat actors using publicly available information sources and common, well-known tactics...
Severity Rating: Important
Revision Note: V1.0 (November 8, 2016): Bulletin published.
Summary: The Windows Virtual Hard Disk Driver improperly handles user access to certain files. An attacker can manipulate files in locations not intended to be available to the user by exploiting this...
I'd like some information regarding the 'wait to kill key' in Windows 7. I believe that this key has been referred to as a corrupt Microsoft key. On the advice of HP, about a year ago, HP advised me to 'delete' the aforesaid key. However, in some forums, they say to modify this key.
Exactly...
Lets see, where to start.. First off, this problem is concerning a home build which I made personally. If you want more specs than what is listed in my profile, just ask. This home build was working perfectly until some misfortune happed on it. That will be in further detail in the following...
bsod
computer
data recovery
drive issues
hard drive
hardware issues
home built
lightning
ntfs
reformat
stop error
system crash
technicaldetails
troubleshooting
windows 7
I have tried startup repair and it doesn't work
i tried to do system restore and an error thing pops up telling to me close my antivirus and try system restore again
I can't go in to safe mode and when i try it loads through the sys files but stops and the last loaded sys file was classpnp.sys...
IM an Expert is a publicly available Lync instant messaging question-and-answer service that enables users to find answers to questions by asking other users. Users can opt-in, and then the service harnesses the database of experts to connect people together via IM.
In Part 2 of this series...
api
bot development
communication
community
database
experts
lync
messaging
microsoft
part 2
question and answer
research
software development
tech experience
technicaldetails
ucma
unified communications
user connections
Hi guys,
I'm new to the forum, but have been lurking around for a few months when a previous thread helped me diagnose a BSOD for my friend. Sorry guys...I read the 'rules' for BSOD help requests but due to the nature of my problem, no .dmp files are attainable.
I've got a problem that...
asio drivers
blue screen
bsod
dell
driver issues
error
error resolution
hardware change
page fault
reinstall
safe mode
software changes
startup
system crash
system repair
system restore
technicaldetails
troubleshooting
user support
windows 7
Many thousands of you have watched Stephan T. Lavavej's great Link Removed on Channel 9. If you haven't, then you should.
There are two STLs: the Standard Template Library and Stephan T. Lavavej Link Removed You will get to know a lot about each STL over the course of these lectures.
Advanced...
As promised, the great Stephan T. Lavavej is back! Link Removed Tens of thousands of you have watched STL's (those are his initials, so that's what we call him) Link Removed, or Standard Template Library. If you haven't, you should. This series, Advanced STL, covers the gory details of the...
As promised, the great Stephan T. Lavavej is back! Link Removed Tens of thousands of you have watched STL's (those are his initials, so that's what we call him) Link Removed, or Standard Template Library. If you haven't, you should. This series, Advanced STL, will cover the gory details of the...
Welcome to another installment of C9 Lectures covering the powerful general C++ library, STL. Joining us once again is the great Stephan T. Lavavej, Microsoft's keeper of the STL cloth (this means he manages the partnership between the owners of STL (dinkumware) and Microsoft, including, of...
Welcome to another installment of C9 Lectures covering the powerful general C++ library, STL. Joining us once again is the great Stephan T. Lavavej, Microsoft's keeper of the STL cloth (this means he manages the partnership between the owners of STL (dinkumware) and Microsoft, including, of...
algorithms
bug fixes
c++
c++ library
c9 lectures
container classes
data structures
educational video
enhancements
iterators
library development
programming
regular expressions
software development
standard template library
stephan lavavej
stl
technicaldetails
templates
visual c++
Welcome to another installment of C9 Lectures covering the powerful general C++ library, STL. Joining us once again is the great Stephan T. Lavavej, Microsoft's keeper of the STL cloth (this means he manages the partnership between the owners of STL (dinkumware) and Microsoft, including, of...
algorithms
c++
c9 lectures
container classes
data structures
enhancements
general purpose
insert iterators
iterators
library development
nicolai josuttis
parameterization
reference
sorting
stephan lavavej
stl
technicaldetails
templates
tutorial
visual c++