Browse by Tags


  • Blog Post: Don't Believe Everything You Read

    Recently, I was contacted by a customer who was advised by an ISV to set a registry value under one of the sub keys in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\.  Let's call it UseQuantumComputing = 1 (value name has been changed to protect the ISV).  The customer...
  • Blog Post: Determining the source of Bug Check 0x133 (DPC_WATCHDOG_VIOLATION) errors on Windows Server 2012

    What is a bug check 0x133? Starting in Windows Server 2012, a DPC watchdog timer is enabled which will bug check a system if too much time is spent in DPC routines. This bug check was added to help identify drivers that are deadlocked or misbehaving.  The bug check is of type "DPC_WATCHDOG_VIOLATION"...
  • Blog Post: How the Clipboard Works, Part 2

    Last time , we discussed how applications place data on the clipboard, and how to access that data using the debugger.   Today, we'll take a look at how an application can monitor the clipboard for changes.   Understanding this is important because it is a place where Windows allows 3 rd -party...
  • Blog Post: How the Clipboard Works, Part 1

    Recently I had the opportunity to debug the clipboard in Windows, and I thought I’d share some of the things I learned.   The clipboard is one of those parts of Windows that many of us use dozens (hundreds?) of times a day and don’t really think about.   Before working on this case, I had never...
  • Blog Post: Debugging Backwards: Proving root cause

    Matt Burrough here again.   On rare occasions when debugging, we'll actually know (or strongly suspect) what the root cause of a problem is at the beginning of our analysis - but we still need to investigate to confirm our assertion.   The following is a case study for an issue I worked on...
  • Blog Post: For testing purposes only, and other desktop watermarks

    Hi all, Matt here again.   One of our team’s main functions is to work with our development teams to create hotfixes when customers run into issues that can only be resolved through a code change.   The developers will often prepare a private test fix that either tests the proposed change,...
  • Blog Post: Control Panel Policy and the Missing Icon

    A customer recently reported a rather peculiar problem.   They were working on a roll out of Windows 7, and one of the policies they employed on their domain was the “ Show only specified control panel applets ” setting.   As its name implies, this policy allows an administrator to specify...
  • Blog Post: Expanding Netmon to aid in debugging

    A walk-through of creating a Netmon parser in the context of a real case As is obvious to frequent readers of our blog, our team logs a lot of time in our debugger of choice (for some windbg, for others kd). However, a debugger is not always the best tool for the job, and sometimes even the best...
  • Blog Post: Case Study - Software Restriction Policies and Large EXE Files

    Recently I received a debugging request for a customer having problems running large executables. On their systems, they could run most EXEs without any problems, but they had two programs that were over 1.8 GB which, when run, would display the following error: If they tried to run them in a command...
  • Blog Post: Unlocking some puzzles requires building a better key... board

    Hi, this is Matt from the Windows Performance team. Sometimes we are presented with problems that defy our usual troubleshooting and require a creative approach. In a recent case, we needed a way to test the responsiveness of an application as text was typed into its fields. Initially, we tested the...
Page 1 of 1 (10 items)