| 
						
							
								Go up
							
						 | 
						— | 
						— | 
						 | 
					
					
						 | 
						
							
								
								2024-01-01 - How do I prevent my ATL class from participating in COM aggregation_ DECLARE_NOT_AGGREGATABLE didn't work - The Old New Thing.pdf
							
						 | 
						151 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-01 - Russian Language Cybercriminal Forums - An Excursion Into The Core Of The Underground Ecosystem..pdf
							
						 | 
						6.3 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-01 - The CrowdStrike Global Threat Report.pdf
							
						 | 
						422 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-02 - Critical Infrastructure Remains the Brass Ring for Cyber Attackers in 2024.pdf
							
						 | 
						214 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-02 - It rather involved being on the other side of this airtight hatchway_ Attacking another program by modifying its memory - The Old New Thing.pdf
							
						 | 
						122 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-03 - Why doesn't my code compile when I change a shared_ptr_T_(p) to an equivalent make_shared_T_(p)_ - The Old New Thing.pdf
							
						 | 
						205 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-04 - How can I specify icons for my app to use on the Start menu in high contrast mode_ - The Old New Thing.pdf
							
						 | 
						110 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-04 - Qakbot Returns.pdf
							
						 | 
						446 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-05 - The case of the vector with an impossibly large size - The Old New Thing.pdf
							
						 | 
						222 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-05 - Turkish espionage campaigns in the Netherlands.pdf
							
						 | 
						3.7 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-08 - How do I prevent my Cplusplus_WinRT implementation class from participating in COM aggregation_ - The Old New Thing.pdf
							
						 | 
						146 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-09 - After I accidentally denied access to everyone, how do I get access back_ - The Old New Thing.pdf
							
						 | 
						119 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-09 - IcedID – Technical Malware Analysis [Second Stage].pdf
							
						 | 
						7.2 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-10 - In Cplusplus_WinRT, how can I await multiple coroutines and capture the results_, part 1 - The Old New Thing.pdf
							
						 | 
						128 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-11 - In Cplusplus_WinRT, how can I await multiple coroutines and capture the results_, part 2 - The Old New Thing.pdf
							
						 | 
						133 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-12 - In Cplusplus_WinRT, how can I await multiple coroutines and capture the results_, part 3 - The Old New Thing.pdf
							
						 | 
						150 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-12 - Sneaky Azorult Back in Action and Goes Undetected.pdf
							
						 | 
						1.8 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-15 - Cplusplus_WinRT gotcha_ Not all exceptions derive from hresult_error - The Old New Thing.pdf
							
						 | 
						130 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-16 - What is a hard error, and what makes it harder than an easy error_ - The Old New Thing.pdf
							
						 | 
						115 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-17 - Getting a strong reference from the this pointer too soon - The Old New Thing.pdf
							
						 | 
						168 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-18 - Chae$ Chronicles- Version 4.1 Dedicated to Morphisec Researchers.pdf
							
						 | 
						1.3 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-18 - Detect Mortis Locker Ransomware with YARA.pdf
							
						 | 
						1.5 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-18 - Implementing two-phase initialization with ATL - The Old New Thing.pdf
							
						 | 
						148 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-19 - The case of the fail-fast trying to log a caught exception - The Old New Thing.pdf
							
						 | 
						213 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-22 - Accessing a block of memory represented by a Windows Runtime IMemoryBuffer - The Old New Thing.pdf
							
						 | 
						172 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-23 - CherryLoader- A New Go-based Loader Discovered in Recent Intrusions.pdf
							
						 | 
						1.1 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-23 - Kasseika Ransomware Deploys BYOVD Attacks, Abuses PsExec and Exploits Martini Driver.pdf
							
						 | 
						1.4 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-23 - Stately Taurus Targets Myanmar Amidst Concerns over Military Junta’s Handling of Rebel Attacks.pdf
							
						 | 
						4.8 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-23 - The useless IMemory_Buffer_Reference.Closed event - The Old New Thing.pdf
							
						 | 
						124 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-24 - The dangerous implementations of the IMemory_Buffer_Reference.Closed event - The Old New Thing.pdf
							
						 | 
						140 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-25 - Broomstick Analysis Report (IRIS-17079).pdf
							
						 | 
						45 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-25 - How can I give away a COM reference just before my object destructs_ - The Old New Thing.pdf
							
						 | 
						178 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-25 - NSPX30- A sophisticated AitM-enabled implant evolving since 2005.pdf
							
						 | 
						1.3 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-26 - How can I expose a pre-existing block of memory as a Windows Runtime object without copying the data_ - The Old New Thing.pdf
							
						 | 
						175 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-26 - The life and times of Cozy Bear, the Russian hackers who just hit Microsoft and HPE.pdf
							
						 | 
						185 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-29 - A comparison of various implementations of the Windows Runtime IMemory_Buffer - The Old New Thing.pdf
							
						 | 
						168 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-29 - Blackwood APT Group Has a New DLL Loader.pdf
							
						 | 
						633 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-29 - Compromised Routers Are Still Leveraged as Malicious Infrastructure to Target Government Organizations in Europe and the Caucasus.pdf
							
						 | 
						701 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-29 - KrustyLoader - Rust malware linked to Ivanti ConnectSecure compromises.pdf
							
						 | 
						257 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-30 - DarkGate malware delivered via Microsoft Teams - detection and response.pdf
							
						 | 
						284 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-30 - Police disrupt Grandoreiro banking malware operation, make arrests.pdf
							
						 | 
						411 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-30 - Python’s Byte- The Rise of Scripted Ransomware.pdf
							
						 | 
						2.0 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-30 - Smoothing over the differences (and defects) in the various implementations of IMemory_Buffer - The Old New Thing.pdf
							
						 | 
						138 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-30 - The Bear and The Shell- New Campaign Against Russian Opposition.pdf
							
						 | 
						3.3 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-31 - How can I add an environment variable to a process launched via Shell_Execute_Ex or IContext_Menu_ - The Old New Thing.pdf
							
						 | 
						146 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-31 - Pawn Storm Uses Brute Force and Stealth Against High-Value Targets.pdf
							
						 | 
						964 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-31 - Technical analysis- The silent torrent of VileRAT.pdf
							
						 | 
						487 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-31 - Tracking 15 Years of Qakbot Development.pdf
							
						 | 
						2.9 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-01-31 - U.S. Government Disrupts Botnet People’s Republic of China Used to Conceal Hacking of Critical Infrastructure.pdf
							
						 | 
						96 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-01 - Analysis and Detection of STEADY#URSA Attack Campaign Targeting Ukraine Military Dropping New Covert SUBTLE-PAWS PowerShell Backdoor.pdf
							
						 | 
						2.2 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-01 - ESET takes part in global operation to disrupt the Grandoreiro banking trojan.pdf
							
						 | 
						867 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-01 - Installskey Rewind 2023.pdf
							
						 | 
						505 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-01 - PurpleFox malware infects thousands of computers in Ukraine.pdf
							
						 | 
						1.1 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-01 - T34loader payload URLs.pdf
							
						 | 
						63 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-01 - Using virtual memory placeholders to allocate contiguous address space for multiple purposes.pdf
							
						 | 
						106 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-02 - CrackedCantil Dropper Delivers Numerous Malware.pdf
							
						 | 
						870 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-02 - FritzFrog Botnet Expands Attack Arsenal with Log4Shell Exploits.pdf
							
						 | 
						1.3 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-02 - Practical FOFA Asset Expansion- APT-C-23 Android Malware.pdf
							
						 | 
						259 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-02 - Proactive response- AnyDesk, any breach.pdf
							
						 | 
						396 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-02 - The case of the invalid parameter error from Measure_Override.pdf
							
						 | 
						190 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-02 - WikiLoader -notepad- part 1 - Decrypting Shellcode.pdf
							
						 | 
						234 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-03 - From Discussion Forums to Malware Mayhem- The Alarming Rise of Abuse on Google Groups and Usenet.pdf
							
						 | 
						5.5 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-04 - CrackedCantil- A Malware Symphony Breakdown.pdf
							
						 | 
						394 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-05 - How can I close a thread pool and cancel all work that had been queued to it .pdf
							
						 | 
						80 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-05 - How to remove CrackedCantil from the operating system.pdf
							
						 | 
						1.2 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-06 - Beware- Fake Facebook Job Ads Spreading 'Ov3r_Stealer' to Steal Crypto and Credentials.pdf
							
						 | 
						1014 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-06 - On using milliseconds as a measure of network latency.pdf
							
						 | 
						60 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-07 - HijackLoader Expands Techniques to Improve Defense Evasion.pdf
							
						 | 
						1.0 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-07 - How to tell if your toothbrush is being used in a DDoS attack.pdf
							
						 | 
						447 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-07 - Kimsuky disguised as a Korean company signed with a valid certificate to distribute Troll Stealer.pdf
							
						 | 
						349 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-07 - KV-Botnet- Don’t call it a Comeback.pdf
							
						 | 
						512 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-07 - MAR-10448362-1.v1 Volt Typhoon.pdf
							
						 | 
						347 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-07 - PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure.pdf
							
						 | 
						1.2 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-07 - Raspberry Robin Keeps Riding the Wave of Endless 1-Days.pdf
							
						 | 
						505 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-07 - Why doesn't my program get fancy drag_drop effects in high contrast mode with CLSID_Drag_Drop_Helper.pdf
							
						 | 
						78 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-08 - How do I suppress the error box that appears when a LoadLibrary fails.pdf
							
						 | 
						81 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-08 - Unmasking-the-dot-stealer.pdf
							
						 | 
						1.2 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-09 - A Beginners Guide to Tracking Malware Infrastructure.pdf
							
						 | 
						4.9 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-09 - On the virtues of the trailing comma.pdf
							
						 | 
						122 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-09 - The Phoenix Rises Again.pdf
							
						 | 
						603 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-11 - Analysing STOP Ransomware.pdf
							
						 | 
						807 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-12 - Decryptor for Rhysida ransomware is available!.pdf
							
						 | 
						182 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-12 - FBI seizes Warzone RAT infrastructure, arrests malware vendor.pdf
							
						 | 
						607 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-12 - How can I get the Windows Runtime HttpClient to display a basic authentication prompt .pdf
							
						 | 
						88 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-12 - The (D)Evolution of Pikabot.pdf
							
						 | 
						1.0 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-12 - WikiLoader -notepad- part 2 - bingmaps.dll & explorer.exe injection.pdf
							
						 | 
						141 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-13 - Bumblebee Buzzes Back in Black.pdf
							
						 | 
						870 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-13 - It rather involved being on the other side of this airtight hatchway_ Attacking a domain administrator from the local administrator.pdf
							
						 | 
						63 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-13 - Water Hydra Targets Traders with Microsoft Defender SmartScreen Zero-Day.pdf
							
						 | 
						3.6 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-13 - What is Lumma Stealer-.pdf
							
						 | 
						1.2 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-14 - Functions that return the size of a required buffer generally return upper bounds, not tight bounds.pdf
							
						 | 
						80 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-14 - My-Game Retired- Latest Changes to Gootloader.pdf
							
						 | 
						143 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-14 - Zloader Strikes Back.pdf
							
						 | 
						2.5 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-15 - Foreign National Pleads Guilty to Role in Cybercrime Schemes Involving Tens of Millions of Dollars in Losses.pdf
							
						 | 
						85 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-15 - Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU).pdf
							
						 | 
						97 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-15 - Registered command lines are just command lines, not a programming language.pdf
							
						 | 
						79 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-15 - TinyTurla Next Generation - Turla APT spies on Polish NGOs.pdf
							
						 | 
						1.2 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-15 - Zeus, IcedID malware gangs leader pleads guilty, faces 40 years in prison.pdf
							
						 | 
						907 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-16 - If you're just going to sit there doing nothing, at least do nothing correctly.pdf
							
						 | 
						111 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-16 - Malware Analysis — AgentTesla.pdf
							
						 | 
						543 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-16 - Writing a Qakbot 5.0 config extractor with Malcat.pdf
							
						 | 
						4.5 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-19 - A Technical Analysis of the BackMyData Ransomware Used to Attack Hospitals in Romania.pdf
							
						 | 
						3.2 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-19 - Anatsa Trojan Returns- Targeting Europe and Expanding Its Reach.pdf
							
						 | 
						5.5 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-19 - Why can't I trigger a manual blue screen crash by injecting the magic key sequence .pdf
							
						 | 
						98 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-20 - International investigation disrupts the world’s most harmful cyber crime group.pdf
							
						 | 
						120 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-20 - Microspeak_ Closing out, duping out.pdf
							
						 | 
						78 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-21 - A stealthy threat uncovered- TeaBot on Google Play Store.pdf
							
						 | 
						4.0 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-21 - Brussels spyware bombshell- Surveillance software found on officials’ phones.pdf
							
						 | 
						102 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-21 - Malware Analysis — Remcos RAT.pdf
							
						 | 
						132 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-21 - Once your object reaches final_release, you are committed to destructing it (eventually) .pdf
							
						 | 
						90 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-21 - To Russia With Love- Assessing a KONNI-Backdoored Suspected Russian Consular Software Installer.pdf
							
						 | 
						706 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-22 - Doppelgänger - Russia-Aligned Influence Operation Targets Germany.pdf
							
						 | 
						1.5 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-22 - Gotcha - Don't forget to shut down your dispatcher queues.pdf
							
						 | 
						111 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-22 - Malware Analysis - XWorm.pdf
							
						 | 
						173 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-22 - Scattered Spider laying new eggs.pdf
							
						 | 
						926 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-23 - Gotcha - Be careful how you shut down your dispatcher queues.pdf
							
						 | 
						109 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-23 - PIKABOT, I choose you!.pdf
							
						 | 
						1.7 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-26 - A Csharp LINQ one-liner to check if exactly one of a set of conditions is met.pdf
							
						 | 
						79 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-26 - Advanced CyberChef Techniques for Configuration Extraction - Detailed Walkthrough and Examples.pdf
							
						 | 
						10 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-27 - European diplomats targeted by SPIKEDWINE with WINELOADER.pdf
							
						 | 
						1.5 MiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-27 - Mitigating attacks based on knowing the length of a Windows Hello PIN .pdf
							
						 | 
						77 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-28 - On the whole idea of giving away a reference to yourself at destruction .pdf
							
						 | 
						98 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-02-29 - If a parameter isn't used, what should I pass .pdf
							
						 | 
						85 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-01 - Cplusplus_WinRT performance trap_ Switching to Windows Runtime too soon - The Old New Thing.pdf
							
						 | 
						100 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-04 - Is shadowing a member variable from a base class a bad thing_ Maybe, but maybe not. - The Old New Thing.pdf
							
						 | 
						118 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-05 - In domain_user syntax, you can often use the period as an abbreviation for _this computer_ - The Old New Thing.pdf
							
						 | 
						69 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-06 - How do I make an expression non-movable_ What's the opposite of std__move_ - The Old New Thing.pdf
							
						 | 
						81 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-07 - In Cplusplus_WinRT, you shouldn't destroy an object while you're co_awaiting it - The Old New Thing.pdf
							
						 | 
						95 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-08 - How can I force a copy of a Cplusplus value_ - The Old New Thing.pdf
							
						 | 
						104 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-08 - The 2024_2025 Seattle Symphony subscription season at a glance - The Old New Thing.pdf
							
						 | 
						236 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-11 - Class template argument deduction (CTAD) and Cplusplus COM wrappers_ Initial explorations - The Old New Thing.pdf
							
						 | 
						83 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-12 - How well does _com_ptr_t support class template argument deduction (CTAD)_ - The Old New Thing.pdf
							
						 | 
						102 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-13 - How well does MFC IPTR_CIP support class template argument deduction (CTAD)_ - The Old New Thing.pdf
							
						 | 
						113 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-14 - How well does ATL CComPtr support class template argument deduction (CTAD)_ - The Old New Thing.pdf
							
						 | 
						86 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-15 - How well does WRL ComPtr support class template argument deduction (CTAD)_ - The Old New Thing.pdf
							
						 | 
						124 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-18 - How well does wil com_ptr support class template argument deduction (CTAD)_ - The Old New Thing.pdf
							
						 | 
						92 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-19 - How well does Cplusplus_WinRT com_ptr support class template argument deduction (CTAD)_ - The Old New Thing.pdf
							
						 | 
						87 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-20 - Using the Display_Information class from a desktop Win32 application, part 1 - The Old New Thing.pdf
							
						 | 
						99 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-21 - Using the Display_Information class from a desktop Win32 application, part 2 - The Old New Thing.pdf
							
						 | 
						112 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-22 - Why does my thread get a broken string as its initial parameter_ - The Old New Thing.pdf
							
						 | 
						137 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-25 - Why isn't Cplusplus using my default parameter to deduce a template type - The Old New Thing.pdf
							
						 | 
						90 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-26 - Dubious security vulnerability_ Manual operations can cause a program to hang - The Old New Thing.pdf
							
						 | 
						60 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-27 - Some choices for encrypting data so that it can be decrypted only by the same user or computer - The Old New Thing.pdf
							
						 | 
						106 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-28 - I called Create_Environment_Block with a process's token, but I didn't get that process's environment - The Old New Thing.pdf
							
						 | 
						82 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-03-29 - How can I tell Cplusplus that I want to discard a nodiscard value_ - The Old New Thing.pdf
							
						 | 
						88 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-01 - Subroutine calls in the ancient world, before computers had stacks or heaps.pdf
							
						 | 
						108 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-02 - The history of computing, as told by the hallways of Microsoft Building 41.pdf
							
						 | 
						549 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-03 - Windows debugger trick - Breaking when a specific debugger message is printed.pdf
							
						 | 
						72 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-04 - It rather involved being on the other side of this airtight hatchway_ System corruption caused by an administrator.pdf
							
						 | 
						88 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-05 - The case of the exception that a catch (...) didn't catch.pdf
							
						 | 
						151 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-08 - How does the classic Win32 ListView handle incremental searching.pdf
							
						 | 
						80 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-09 - If I enumerate all the processes and add up all the Get_Gui_Resources, why doesn't it match the GR_GLOBAL value.pdf
							
						 | 
						91 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-10 - How can I find out which process has locked me out of the clipboard.pdf
							
						 | 
						90 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-11 - Why do STANDARD_RIGHTS_READ, STANDARD_RIGHTS_WRITE, and STANDARD_RIGHTS_EXECUTE have the same values.pdf
							
						 | 
						94 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-12 - The case of the string being copied from a mysterious pointer to invalid memory.pdf
							
						 | 
						145 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-15 - What were the tax consequences of letting Windows 95 team members keep a piece of software as long as they tested it.pdf
							
						 | 
						93 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-17 - Adding state to the update notification pattern, part 1.pdf
							
						 | 
						103 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-18 - Adding state to the update notification pattern, part 2.pdf
							
						 | 
						129 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-19 - Adding state to the update notification pattern, part 3.pdf
							
						 | 
						94 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-22 - Adding state to the update notification pattern, part 4.pdf
							
						 | 
						109 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-23 - Adding state to the update notification pattern, part 5.pdf
							
						 | 
						122 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-24 - Adding state to the update notification pattern, part 6.pdf
							
						 | 
						87 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-25 - Adding state to the update notification pattern, part 7.pdf
							
						 | 
						118 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-26 - Adding state to the update notification pattern, part 8.pdf
							
						 | 
						72 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-29 - Awaiting a set of handles in Cplusplus_WinRT.pdf
							
						 | 
						83 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-04-30 - Awaiting a set of handles with a timeout, part 1_ Starting with two.pdf
							
						 | 
						96 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-01 - Awaiting a set of handles with a timeout, part 2 - Continuing with two.pdf
							
						 | 
						83 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-02 - Awaiting a set of handles with a timeout, part 3 - Going beyond two.pdf
							
						 | 
						94 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-03 - Awaiting a set of handles with a timeout, part 4 - Building our own awaiter.pdf
							
						 | 
						162 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-06 - Awaiting a set of handles with a timeout, part 5 - Generalizing the awaiter.pdf
							
						 | 
						113 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-07 - Awaiting a set of handles with a timeout, part 6 - Capturing the handles efficiently.pdf
							
						 | 
						103 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-08 - Awaiting a set of handles with a timeout, part 7 - Just doing it one at a time.pdf
							
						 | 
						92 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-09 - Asking for a DispatcherQueue from a GUI thread you created.pdf
							
						 | 
						88 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-10 - An informal comparison of the three major implementations of std__string.pdf
							
						 | 
						182 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-13 - Before you try to change something, make sure you can change nothing.pdf
							
						 | 
						76 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-14 - The confidential coffee maker was not the only source of shenanigans at the IBM Boca office.pdf
							
						 | 
						71 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-15 - Building the most efficient device selector query that selects no devices.pdf
							
						 | 
						105 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-16 - Pulling a single item from a Cplusplus parameter pack by its index.pdf
							
						 | 
						90 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-17 - Why can't I find the injected name of a templated class's templated base class.pdf
							
						 | 
						116 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-20 - If you know what interface you want, just pass it directly to CoCreateInstance.pdf
							
						 | 
						85 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-21 - A blurry photo of the legendary USB Cart of Death.pdf
							
						 | 
						178 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-22 - If you have to create a Windows Runtime Vector from Cplusplus WinRT, do it as late as possible.pdf
							
						 | 
						95 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-23 - Creating a prepopulated Windows Runtime Vector from Cplusplus_WinRT without going through an explicit std__vector.pdf
							
						 | 
						105 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-24 - Setting the contents of a Windows Runtime Vector from Cplusplus_WinRT in one call.pdf
							
						 | 
						93 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-27 - Is there any difference between String_From_IID and String_From_CLSID_.pdf
							
						 | 
						73 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-28 - How can I force a DLL to register itself if it won't respond to regsvr32.pdf
							
						 | 
						86 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-29 - A graphical depiction of the steps in building a Cplusplus executable, basics.pdf
							
						 | 
						117 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-30 - A graphical depiction of the steps in building a Cplusplus executable, enhanced for classic Win32 .pdf
							
						 | 
						91 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-05-31 - A graphical depiction of the steps in building a Cplusplus executable, with XAML and packaging.pdf
							
						 | 
						172 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-03 - More on harmful overuse of stdmove.pdf
							
						 | 
						100 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-04 - Why does GlobalLock max out at 255 locks.pdf
							
						 | 
						88 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-05 - How 16-bit Windows cached INI files for performance.pdf
							
						 | 
						81 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-06 - Can INI files be Unicode Yes they can but it has to be your idea.pdf
							
						 | 
						83 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-07 - Whats the deal with stdtype_identity.pdf
							
						 | 
						115 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-10 - How do I get the name of a SID and what does it mean when the conversion fails.pdf
							
						 | 
						90 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-11 - The origin story of the Windows 3D Pipes screen saver.pdf
							
						 | 
						71 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-12 - Lock-free reference-counting a TLS slot using atomics part 1.pdf
							
						 | 
						86 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-13 - Lock-free reference-counting a TLS slot using atomics part 2.pdf
							
						 | 
						108 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-14 - Lock-free reference-counting a TLS slot using atomics part 3.pdf
							
						 | 
						122 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-17 - How can I view the list of symbols available in a library.pdf
							
						 | 
						67 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-18 - The time smart quotes prevented the entire Office division from committing code.pdf
							
						 | 
						56 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-19 - On the sadness of treating counted strings as null-terminated strings.pdf
							
						 | 
						98 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-20 - How to convert between different types of counted-string string types.pdf
							
						 | 
						141 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-21 - The Windows Runtime winrthstring and the C stdwstring are inter-assignable.pdf
							
						 | 
						65 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-24 - Finding a specific value in a sequence of integers that changes by at most 1.pdf
							
						 | 
						82 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-25 - Microspeak Fun fork.pdf
							
						 | 
						80 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-26 - Is there a built-in way in CWinRT to get the string name for a Windows Runtime enum.pdf
							
						 | 
						74 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-27 - Writing a remove_all_pointers type trait part 1.pdf
							
						 | 
						113 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-28 - 2024 mid-year link clearance.pdf
							
						 | 
						87 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-06-28 - Writing a remove_all_pointers type trait part 2.pdf
							
						 | 
						81 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-01 - If I register the same shell extension as both a context menu extension and a dragdrop extension how .pdf
							
						 | 
						118 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-02 - The history of Altnumber sequences and why Alt9731 sometimes gives you a heart and sometimes a snowma.pdf
							
						 | 
						123 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-03 - How do I produce a Windows Runtime asynchronous activity from CCX.pdf
							
						 | 
						142 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-04 - How do I produce a Windows Runtime asynchronous activity from C.pdf
							
						 | 
						127 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-05 - How do I produce a Windows Runtime asynchronous activity from CWinRT.pdf
							
						 | 
						87 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-08 - Whats the point of stdmonostate You cant do anything with it.pdf
							
						 | 
						117 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-09 - Creating an already-completed asynchonous activity in CWinRT part 1.pdf
							
						 | 
						86 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-10 - Creating an already-completed asynchronous activity in CWinRT part 2.pdf
							
						 | 
						106 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-11 - Creating an already-completed asynchronous activity in CWinRT part 3.pdf
							
						 | 
						103 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-12 - Creating an already-completed asynchronous activity in CWinRT part 4.pdf
							
						 | 
						112 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-15 - Creating an already-completed asynchronous activity in CWinRT part 5.pdf
							
						 | 
						112 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-16 - Creating an already-completed asynchronous activity in CWinRT part 6.pdf
							
						 | 
						94 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-17 - Creating an already-completed asynchronous activity in CWinRT part 7.pdf
							
						 | 
						92 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-18 - Creating an already-completed asynchronous activity in CWinRT part 8.pdf
							
						 | 
						128 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-19 - Creating an already-completed asynchronous activity in CWinRT part 9.pdf
							
						 | 
						85 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-22 - Organizing the five creation dispositions of the CreateFile function.pdf
							
						 | 
						94 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-23 - Unquoted service paths The new frontier in script kiddie security vulnerability reports.pdf
							
						 | 
						142 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-24 - API naming principle If there is no direct object then the direct object is the source object.pdf
							
						 | 
						88 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-25 - In my Visual Studio project I set my Conformance mode to permissive but its still not permissive.pdf
							
						 | 
						102 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-26 - What can I do if IMlangConvertCharset is unable to convert from code page 28591 directly to UTF-8.pdf
							
						 | 
						106 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-29 - Why dont Windows Imaging Component pixel format GUIDs continue their nice pattern.pdf
							
						 | 
						88 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-30 - There is no mystery over who wrote the Blue Screen of Death despite what some may want you to believe.pdf
							
						 | 
						112 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-07-31 - How to compress out interior padding in a stdpair and why you dont want to.pdf
							
						 | 
						255 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-01 - Whats the difference between DataPackageViewGetUriAsync and DataPackageViewGetWebLinkAsync.pdf
							
						 | 
						138 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-02 - The difference between undefined behavior and ill-formed C programs.pdf
							
						 | 
						131 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-05 - What are the dire consequences of registering a RunOnce command from my RunOnce command.pdf
							
						 | 
						75 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-06 - It rather involved being on the other side of the airtight hatchway Disabling a security feature as a.pdf
							
						 | 
						102 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-07 - How do I know when the user has finished interacting with the AccountsSettingsPane.pdf
							
						 | 
						76 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-08 - Why do I get E_ACCESSDENIED when trying to access my brokered Windows Runtime objectCOM is double-che.pdf
							
						 | 
						96 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-09 - What does it even mean to Close a Windows Runtime asynchronous operation or action.pdf
							
						 | 
						110 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-12 - Embracing the power of the empty set in API design and applying this principle to selectors and filte.pdf
							
						 | 
						127 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-13 - A look back at one of the many projects code-named Highlander.pdf
							
						 | 
						80 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-14 - Temporarily dropping a lock The anti-lock pattern.pdf
							
						 | 
						123 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-15 - Instead of putting a hash in the Portable Executable timestamp field why not create a separate field .pdf
							
						 | 
						101 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-16 - The case of the missing ordinal 380.pdf
							
						 | 
						99 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-19 - Constructing nodes of a hand-made linked list how hard can it be.pdf
							
						 | 
						118 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-20 - Another tribute to Microsoft history hiding in Building 41.pdf
							
						 | 
						113 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-21 - What does ERROR_KEY_DELETED mean.pdf
							
						 | 
						73 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-22 - The role of the activation factory in the Windows Runtime.pdf
							
						 | 
						86 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-23 - What if I need to wait for more than MAXIMUM_WAIT_OBJECTS threads.pdf
							
						 | 
						90 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-26 - Thoughts on finding the essential elements of a set.pdf
							
						 | 
						82 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-27 - The MicrosoftIBM joint development was built on mutual respect wait is respect the right word.pdf
							
						 | 
						67 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-28 - On the strange status of wchar_t in classic MIDL.pdf
							
						 | 
						98 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-29 - How is the WindowsFoundationUriDomain property different from Host.pdf
							
						 | 
						106 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-08-30 - In the Windows kernel what is a LUID and what makes it loo-ey.pdf
							
						 | 
						86 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-02 - The CoInitializeSecurity function demands an absolute security descriptor.pdf
							
						 | 
						82 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-03 - Why did Windows 95 use blue screen error messages instead of hard error messages.pdf
							
						 | 
						80 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-04 - The case of the image that came out horribly slanted Diagnosis.pdf
							
						 | 
						121 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-05 - The case of the image that came out horribly slanted Taking the pitch into account.pdf
							
						 | 
						130 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-06 - The case of the image that came out horribly slanted Negative stride.pdf
							
						 | 
						231 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-09 - GitHub trick to find the commit that deleted a file.pdf
							
						 | 
						90 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-10 - Does the Resource Compiler have a separate preprocessor or doesnt it.pdf
							
						 | 
						81 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-11 - The case of the string being copied from a mysterious pointer to invalid memory revisited.pdf
							
						 | 
						94 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-12 - How can I tell whether two programs will share drive letter mappings.pdf
							
						 | 
						80 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-13 - The case of the fail-fast crashes coming from the power management system.pdf
							
						 | 
						105 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-16 - Some notes on Win32 carets.pdf
							
						 | 
						86 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-17 - It rather involved being on the other side of this airtight hatchway Posting completions to somebody .pdf
							
						 | 
						90 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-18 - More on the mysterious default_interface attribute in Windows Runtime classes.pdf
							
						 | 
						107 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-19 - My window has the WS_EX_NOACTIVATE extended style but it got activated anyway.pdf
							
						 | 
						80 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-20 - How can I check that all the changes in a git branch have been cherry-picked or rebased into its upst.pdf
							
						 | 
						90 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-23 - Going beyond the empty set Embracing the power of other empty things.pdf
							
						 | 
						136 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-24 - The UserConsentVerifier confirms that the user is there but it doesnt protect any data.pdf
							
						 | 
						82 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-25 - Another example of the Windows Runtime interop pattern Using the UserConsentVerifier from a Win32 pro.pdf
							
						 | 
						113 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-26 - If youre going to specify the LVS_SORTASCENDING or LVS_SORTDESCENDING style you had better be telling.pdf
							
						 | 
						78 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-27 - The case of the crash when destructing a stdmap.pdf
							
						 | 
						165 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-09-30 - Pulling a single item from a C parameter pack by its index remarks.pdf
							
						 | 
						101 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-01 - Misunderstanding the Prevent access to registry editing tools policy.pdf
							
						 | 
						98 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-02 - A function for creating an absolute security descriptor from a self-relative one.pdf
							
						 | 
						98 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-03 - How can I detect whether the user is running as an elevated administrator as opposed to a natural adm.pdf
							
						 | 
						86 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-04 - How does the linker decide whether to call WinMain or wWinMain.pdf
							
						 | 
						119 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-07 - A popular but wrong way to convert a string to uppercase or lowercase.pdf
							
						 | 
						123 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-08 - Microspeak Run to ground.pdf
							
						 | 
						74 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-09 - If threads are created without a message queue why can I post to them immediately upon creation.pdf
							
						 | 
						94 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-10 - A correction to the awaitable lock for C PPL tasks.pdf
							
						 | 
						83 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-11 - How can I explicitly specialize a templated C constructor.pdf
							
						 | 
						124 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-14 - On naming things The tension between naming something for what it is what it does or how it is used.pdf
							
						 | 
						83 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-15 - A quick introduction to return address protection technologies.pdf
							
						 | 
						178 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-16 - Effects of classic return address tricks on hardware-assisted return address protection.pdf
							
						 | 
						94 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-17 - Evaluating tail call elimination in the face of return address protection part 1.pdf
							
						 | 
						86 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-18 - Evaluating tail call elimination in the face of return address protection part 2.pdf
							
						 | 
						82 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-21 - Why does adding WS_MINIMIZEBOX change how my window behaves when the user presses WinD.pdf
							
						 | 
						79 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-22 - Did Windows 95 shrink the default font size of windowed MS-DOS apps.pdf
							
						 | 
						76 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-23 - How do I create a Windows Runtime IRandomAccessStream around a bunch of bytes or a classic COM IStrea.pdf
							
						 | 
						97 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-24 - It rather involved being on the other side of the airtight hatchway Defeating ASLR after youve gained.pdf
							
						 | 
						75 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-25 - How can I explicitly specialize a templated C constructor follow-up notes.pdf
							
						 | 
						120 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-28 - How useful is the hint passed to the stdunordered_ collections.pdf
							
						 | 
						107 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-29 - Reverse-engineering what a short section is.pdf
							
						 | 
						97 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-30 - I have enabled take ownership permission but I still cannot obtain write access.pdf
							
						 | 
						77 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-10-31 - What has case distinction but is neither uppercase nor lowercase.pdf
							
						 | 
						139 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-01 - On locale-aware substring matching either case-sensitive or case-insensitive.pdf
							
						 | 
						92 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-04 - On the limits of time travel in the face of undefined behavior in C.pdf
							
						 | 
						77 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-05 - Whats the difference between Display size and Screen size in the Windows 95 display control panel.pdf
							
						 | 
						124 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-06 - How do I declare an operator overload for my Windows Runtime class.pdf
							
						 | 
						84 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-07 - Why do I observe reads from a memory-mapped file when writing large blocks.pdf
							
						 | 
						91 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-08 - The case of a program that crashed on its first instruction.pdf
							
						 | 
						170 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-11 - Debugger breakpoints are usually implemented by patching the in-memory copy of the code.pdf
							
						 | 
						74 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-12 - Why did Windows 95 setup use three operating systems.pdf
							
						 | 
						103 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-13 - The puzzle of trying to put an object into a stdoptional.pdf
							
						 | 
						141 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-14 - Solving the puzzle of trying to put an object into a stdoptional.pdf
							
						 | 
						151 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-15 - How do I put a non-copyable non-movable non-constructible object into a stdoptional.pdf
							
						 | 
						103 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-18 - The operations for reading and writing single elements for C standard library maps.pdf
							
						 | 
						130 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-19 - A wrinkle in how Windows 95 setup bootstrapped its initial GUI step.pdf
							
						 | 
						84 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-20 - How do I determine whether Explorer is showing or hiding file extensions.pdf
							
						 | 
						124 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-21 - How can I detect which menu my item was invoked from.pdf
							
						 | 
						134 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-22 - In C how can I make a default parameter be the this pointer of the caller revisited.pdf
							
						 | 
						144 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-25 - How can I know when a window has processed a message that I posted to it.pdf
							
						 | 
						76 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-26 - Microspeak Real estate and Airspace.pdf
							
						 | 
						74 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-27 - Checking whether a URI refers to a Web site root.pdf
							
						 | 
						113 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-28 - Why does my program successfully take foreground only when running under the debugger.pdf
							
						 | 
						103 KiB | 
						 | 
						 | 
					
					
						 | 
						
							
								
								2024-11-29 - Assessing the attack complexity of a race condition security vulnerability.pdf
							
						 | 
						108 KiB | 
						 | 
						 |