Quantcast
Channel: The Old New Thing
Browsing all 3085 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

On the linguistic productivity of the word spam

The word spam has spawned off its own corner of the English language. spamdexing inflating one's rank in a Web index sping Trackback spam splog A fake blog spim Spam instant messages spasms Spam SMS...

View Article


Image may be NSFW.
Clik here to view.

No, not that M, the other M, the one called Max

Code names are rampant at Microsoft. One of the purposes of a code name is to impress upon the people who work with the project that the name is only temporary, and that the final name will come from...

View Article


Image may be NSFW.
Clik here to view.

Although the x64 calling convention reserves spill space for parameters, you...

Although the x64 calling convention reserves space on the stack as spill locations for the first four parameters (passed in registers), there is no requirement that the spill locations actually be...

View Article

Image may be NSFW.
Clik here to view.

Charlie Sheen v Muammar Gaddafi: Whose line is it anyway?

I got seven out of ten right.

View Article

Image may be NSFW.
Clik here to view.

If you're waiting for I/O to complete, it helps if you actually have an I/O...

We saw earlier the importance of waiting for I/O to complete before freeing the data structures associated with that I/O. On the other hand, before you start waiting, you have to make sure that you...

View Article


Image may be NSFW.
Clik here to view.

The window manager needs a message pump in order to call you back unexpectedly

There are a bunch of different ways of asking the window manager to call you when something interesting happens. Some of them are are in response to things that you explicitly asked for right now. The...

View Article

Image may be NSFW.
Clik here to view.

News flash: Companies change their product to appeal to their customers

There was some apparent uproar because there was an industry which "changed the flavoring of their product depending on which market segment they were trying to appeal to." Well duh, don't all...

View Article

Image may be NSFW.
Clik here to view.

What's the difference between FreeResource and, say, DestroyAcceleratorTable

MaxMax asks a number of resource-related questions, starting with "How do you Unlock a Lock­Resource?" and culminating in "What are the differences between Free­Resource and Destroy­Accelerator­Table,...

View Article


Image may be NSFW.
Clik here to view.

Microspeak: Cadence

Originally, the term cadence meant the rate at which a regular event recurs, possibly with variations, but with an overall cycle that repeats. For example, the cadence for team meetings might be...

View Article


Image may be NSFW.
Clik here to view.

How to rescue a broken stack trace: Recovering the EBP chain

When debugging, you may find that the stack trace falls apart: ChildEBP RetAddr 001af118 773806a0 ntdll!KiFastSystemCallRet 001af11c 7735b18c ntdll!ZwWaitForSingleObject+0xc 001af180 7735b071...

View Article

Image may be NSFW.
Clik here to view.

How do I create a topmost window that is never covered by other topmost windows?

We already know that you can't create a window that is always on top, even in the presence of other windows marked always-on-top. An application of the What if two programs did this? rule demonstrates...

View Article

Image may be NSFW.
Clik here to view.

Why does my TIME_ZONE_INFORMATION have the wrong DST cutover date?

Public Service Announcement: Daylight Saving Time begins in most parts of the United States this weekend. Other parts of the world may change on a different day from the United States. A customer...

View Article

Image may be NSFW.
Clik here to view.

The old DEBUG program can load COM files bigger than 64KB, but that doesn't...

Some times ago, I described why a corrupted binary sometimes results in the error "Program too big to fit in memory". Commenter Neil was under the impression that nonrelocatable programs files could...

View Article


Image may be NSFW.
Clik here to view.

Why can't Explorer decide what size a file is?

If you open Explorer and highlight a file whose size is a few kilobytes, you can find some file sizes where the Explorer Size column shows a size different from the value shown in the Details pane....

View Article

Image may be NSFW.
Clik here to view.

Raymond's highly scientific predictions for the 2011 NCAA men's basketball...

Once again, it's time for Raymond to come up with an absurd, arbitrary criterion for filling out his NCAA bracket. This year, I look at the strength of the school's football team, on the theory that a...

View Article


Image may be NSFW.
Clik here to view.

What's up with the mysterious inc bp in function prologues of 16-bit code?

A little while ago, we learned about the EBP chain. The EBP chain in 32-bit code is pretty straightforward because there is only one type of function call. But in 16-bit code there are two types of...

View Article

Image may be NSFW.
Clik here to view.

What does the "l" in lstrcmp stand for?

If you ask Michael Kaplan, he'd probably say that it stands for lame. In his article, Michael presents a nice chart of the various L-functions and their sort-of counterparts. There are other...

View Article


Image may be NSFW.
Clik here to view.

You can extend the PROPSHEETPAGE structure with your own bonus data

... for when regular strength lParam just isn't enough. A little-known and even less-used feature of the shell property sheet is that you can hang custom data off the end of the PROPSHEETPAGE...

View Article

Image may be NSFW.
Clik here to view.

How does the C runtime know whether to use the static-linking or...

In response to a description of what happens when you get dll­import wrong, nksingh asks, "This seems like a problem for the CRT. As far as I know, VC gives you the option of statically or dynamically...

View Article

Image may be NSFW.
Clik here to view.

Why is there the message '!Do not use this registry key' in the registry?

Under Software\Microsoft\Windows\Current­Version\Explorer\Shell Folders, there is a message to registry snoopers: The first value is called "!Do not use this registry key" and the associated data is...

View Article
Browsing all 3085 articles
Browse latest View live