Mark Russinovich
112 TopicsSony’s Rootkit: First 4 Internet Responds
First published on TechNet on Nov 06, 2005 First 4 Internet, the company that implements Sony’s Digital Rights Management (DRM) software that includes a rootkit, has responded to my last post, More on Sony: Dangerous Decloaking Patch, EULAs and Phoning Home.6.8KViews0likes0CommentsThe Case of the Unexplained FTP Connections
First published on TechNet on Oct 28, 2012 A key part of any cybersecurity plan is “continuous monitoring”, or enabling auditing and monitoring throughout a network environment and configuring automated analysis of the resulting logs to identify anomalous behaviors that merit investigation.11KViews1like2CommentsPushing the Limits of Windows: USER and GDI Objects – Part 1
First published on TechNet on Feb 24, 2010 So far in the Pushing the Limits of Windows series, I’ve focused on resources managed by the Windows operating system kernel, including physical and virtual memory, paged and nonpaged pool, processes, threads and handles.22KViews3likes2CommentsPushing the Limits of Windows: Handles
First published on TechNet on Sep 29, 2009 This is the fifth post in my Pushing the Limits of Windows series where I explore the upper bound on the number and size of resources that Windows manages, such as physical memory, virtual memory, processes and threads.72KViews3likes4CommentsPushing the Limits of Windows: Physical Memory
First published on TechNet on Jul 21, 2008 This is the first blog post in a series I'll write over the coming months called Pushing the Limits of Windows that describes how Windows and applications use a particular resource, the licensing and implementation-derived limits of the resource, how to measure the resource’s usage, and how to diagnose leaks.19KViews0likes2Comments