Showing results for Other - The Old New Thing

Dec 28, 2006
Post comments count0
Post likes count0

Stop the madness: Subdirectories of My Documents

Raymond Chen
Raymond Chen

As a follow-up to the difference between My Documents and Application Data, I'd like to rant about all the subdirectories of My Documents that programs create because they think they're so cool. I'm sure there are more. Everything in the My Documents folder the user should be able to point to and say, "I remember creating that file on such-and...

Other
Dec 27, 2006
Post comments count0
Post likes count0

The social skills of a thermonuclear device, part 3

Raymond Chen
Raymond Chen

Some years ago, a group different from the one I worked in invited me to "volunteer" to help them with serious problems they were having with their product. They asked to "borrow" me for one week so that I could magically resolve all their issues. I wasn't really that familiar with their product, and I certainly didn't know how it worked internall...

OtherThe social skills of a thermonuclear device
Dec 25, 2006
Post comments count0
Post likes count0

The Old New Thing book will also be available electronically

Raymond Chen
Raymond Chen

We interrupt this religious holiday for an important commercial announcement. As a special Christmas present, my new best friends at Addison-Wesley sent me an advance copy of the dead-tree edition of my book. (Obligatory plug: Order it from Amazon. You know I want you to.) One commenter asked whether my book would be available electronically. O...

Other
Dec 19, 2006
Post comments count0
Post likes count1

I bet somebody is looking to get a really nice bonus for that feature: Attention

Raymond Chen
Raymond Chen

"I bet somebody is looking to get a really nice bonus for that feature." A customer was having trouble with one of their features that scans for resources that their program can use, and, well, the details aren't important. What's important is that their feature ran in the Startup group, and as soon as it found a suitable resource, it displayed a ...

Other
Dec 11, 2006
Post comments count0
Post likes count0

What does an invalid handle exception in LeaveCriticalSection mean?

Raymond Chen
Raymond Chen

Internally, a critical section is a bunch of counters and flags, and possibly an event. (Note that the internal structure of a critical section is subject to change at any time—in fact, it changed between Windows XP and Windows 2003. The information provided here is therefore intended for troubleshooting and debugging purposes and ...

Other
Dec 6, 2006
Post comments count0
Post likes count2

If you let people read a file, then they can copy it

Raymond Chen
Raymond Chen

Here's a question that floated past my view: How do I set the ACLs on a file so users can read it but can't copy it? I can't find a "Copy" access mask that I can deny. If I can't deny copying, I'd at least like to audit it, so I can tell who made a copy of the file. There is no "Copy" access mask because copying is not a fundamental file operati...

Other
Dec 1, 2006
Post comments count0
Post likes count0

Nailing down what constitutes valuable consideration

Raymond Chen
Raymond Chen

Last time, I introduced a friend I called "Bob" for the purposes of this story. At a party earlier this year, I learned second-hand what Bob had been up to more recently. The team Bob worked for immediately prior to his retirement gave him a call. "Hi, Bob. We're trying to ship version N+1 of Product X, and we really need your help. I k...

Other
Nov 30, 2006
Post comments count0
Post likes count0

It took two of us to keep up with one Bob

Raymond Chen
Raymond Chen

One of my friends (let's call him "Bob") retired from Microsoft many years ago. Bob is an amazing programmer whose skills I remain in awe of. I remember visiting his office one evening with a mutual friend ("Fred") to catch up on things. When we turned up, he showed us a problem that he was working on. He was doing some sort of fancy graphics effe...

Other
Nov 29, 2006
Post comments count0
Post likes count0

A fork is an easy-to-find nonstandard USB device

Raymond Chen
Raymond Chen

Remember the Ten Immutable Laws of Security. Today, we're going to talk about number three: If a bad guy has unrestricted physical access to your computer, it's not your computer any more. There was a bug which floated past my field of vision many months ago that went something like this: "I found a critical security bug in the USB stack. If some...

Other