Showing results for September 2010 - Page 3 of 4 - The Old New Thing

Sep 14, 2010
0
0

Microspeak: Sats

Raymond Chen
Raymond Chen

I introduced this Microspeak last year as part of a general entry about management-speak, but I'm giving it its own entry because it deserves some attention on its own. I just want to have creative control over how my audience can interact with me without resorting to complex hacking in a way that is easy to explain but ups our blogging audiences...

Non-ComputerMicrospeak
Sep 13, 2010
0
0

Ha ha, the speaker gift is a speaker, get it?

Raymond Chen
Raymond Chen

As a thank-you for presenting at TechReady11, the conference organizers gave me (and presumably the other speakers) a portable speaker with the Windows logo printed on it. The speaker underneath the logo is the X-Mini II Capsule Speaker, and I have to agree with Steve Clayton that they pack a lot of sound in a compact size. Great for taking on ...

Non-Computer
Sep 13, 2010
0
0

Why doesn't Win32 give you the option of ignoring failures in DLL import resolution?

Raymond Chen
Raymond Chen

Yuhong Bao asked, via the Suggestion Box, "Why not implement delay-loading by having a flag in the import entry specifying that Windows should mimic the Windows 3.1 behavior for resolving that import?" Okay, first we have to clear up the false assumptions in the question. The question assumes that Windows 3.1 had delay-loading functionality ...

History
Sep 10, 2010
0
1

Hey there token, long time no see! (Did you do something with your hair?)

Raymond Chen
Raymond Chen

Consider a system where you have a lot of secured objects, and suppose further that checking whether a user has access to an object is a slow operation. This is not as rare as you might think: Even though a single access check against a security descriptor with a small number of ACEs might be fast, you can have objects with complicated security des...

Code
Sep 9, 2010
0
0

Flushing your performance down the drain, that is

Raymond Chen
Raymond Chen

Some time ago, Larry Osterman discussed the severe performance consequences of flushing the registry, which is a specific case of the more general performance catch: Flushing anything will cost you dearly. A while back, I discussed the high cost of the "commit" function, and all the flush-type operations turn into a commit at the end of the day...

Code
Sep 8, 2010
0
0

The contractually obligatory beeper, and the customers who demand them

Raymond Chen
Raymond Chen

One of the fun parts of meeting with other developers, either at conferences or on my self-funded book tour, is exchanging war stories. Here's one of the stories I've collected, from somebody describing a former company. As is customary, I've removed identifying information. One day, the engineering team were instructed that the team was being i...

Non-Computer
Sep 7, 2010
0
0

How do I customize the order of items in the All Programs section of the Start menu?

Raymond Chen
Raymond Chen

The items in the All Programs section of the Start menu are grouped into two sections, although there are no visible divider lines between them. We saw earlier that the Fast Items lost their special status in Windows Vista and are sorted with the regular items. Another change from Windows XP is the order of the remaining two groups: W...

Tips/Support
Sep 3, 2010
0
0

What happens to a named object when all handles to it are closed?

Raymond Chen
Raymond Chen

A customer had a question about named kernel objects: I understand that handles in a process if leaked will be destroyed by the kernel when the process exits. My question would be around named objects. Would named objects hold their value indefinitely? If I run a small utility app to increment a named counting semaphore, the count of that named...

Code
Sep 2, 2010
0
0

It rather involved being on the other side of this airtight hatchway: If you grant users full control over critical files, then it's not the fault of the system for letting users modify them

Raymond Chen
Raymond Chen

Today's dubious security vulnerability is another example of If you reconfigure your computer to be insecure, don't be surprised that there's a security vulnerability. This example comes from by an actual security vulnerability report submitted to Microsoft: I have found a critical security vulnerability that allows arbitrary elevation to admin...

Other