Windows Kernel Internals

  • 11 Blog Articles
Options
4,032
Jin_Lin on 02-24-2021 12:47 PM
2,096
Mehmet_Iyigun on 07-08-2020 10:45 AM
8,231
Hari Pulapaka on 04-06-2020 12:11 PM
28K
Hari Pulapaka on 03-24-2020 08:54 AM
10.4K
Hari Pulapaka on 01-27-2020 11:51 AM
135K
Hari Pulapaka on 03-11-2019 10:04 AM
114K
Hari Pulapaka on 02-21-2019 12:37 PM
1.5M
Hari Pulapaka on 12-18-2018 04:18 PM
164K
Mehmet_Iyigun on 12-05-2018 04:37 PM
184K
Hari Pulapaka on 10-17-2018 12:39 PM

Latest Comments

Thank you for Sharing with the Community !
1 Likes
Thanks for the post, it's a great security feature!I'm also glad that I can use it without having a secured-core PC.
0 Likes
The documentation has been improved since this blog was posted: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-sandbox/windows-sandbox-configure-using-wsb-file There's more options, and some fixes mentioned in the comments here.
0 Likes
Can I use dtrace -Fn 'fbt' or 'pid' to record information during execution that passes through user mode and kernel mode, starting and ending recording at specific addresses in the target program? I need the same thing that the command 'wt' does in WinDbg, but at the same time continuing to record c...
0 Likes
in Windows Sandbox on 12-09-2020
@HotCakeX  LinX not Linux 
0 Likes
Blog Dashboard