When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. ntoskrnl.exe - Wikipedia

    en.wikipedia.org/wiki/Ntoskrnl

    ntoskrnl.exe (short for Windows NT operating system kernel executable), also known as the kernel image, contains the kernel and executive layers of the Microsoft Windows NT kernel, and is responsible for hardware abstraction, process handling, and memory management.

  3. Booting process of Windows - Wikipedia

    en.wikipedia.org/wiki/Booting_process_of_Windows

    The boot loader is responsible for accessing the file system on the boot drive, starting ntoskrnl.exe, and loading boot-time device drivers into memory. Once all the boot and system drivers have been loaded, the kernel starts the session manager (smss.exe), which begins the login process.

  4. Dr. Watson (debugger) - Wikipedia

    en.wikipedia.org/wiki/Dr._Watson_(debugger)

    A crash dump file can also be created, which is a binary file that a programmer can load into a debugger. Dr. Watson can be made to generate more exacting information for debugging purposes if the appropriate symbol files are installed and the symbol search path (environment variable) is set.

  5. Blue screen of death - Wikipedia

    en.wikipedia.org/wiki/Blue_screen_of_death

    The Blue Screen of Death in Windows 9x, as it appears on Windows 95 and Windows 98. The Windows 9x line of operating systems used the Blue Screen of Death as the main way for virtual device drivers to report errors to the user.

  6. Screen of death - Wikipedia

    en.wikipedia.org/wiki/Screen_of_death

    A kernel panic is the Unix equivalent of Microsoft's Blue Screen of Death. It is a routine called when the kernel detects irrecoverable errors in runtime correctness; in other words, when continuing the operation may risk escalating system instability, and a system reboot is easier than attempted recovery.

  7. Fatal system error - Wikipedia

    en.wikipedia.org/wiki/Fatal_system_error

    Instead, it displays the infamous "blue screen of death" (BSoD) and allows the user to attempt to continue. The Windows DDK and the WinDbg documentation both have reference information about most bug checks. The WinDbg package is available as a free download and can be installed by most users. The Windows DDK is larger and more complicated to ...

  8. Kernel Patch Protection - Wikipedia

    en.wikipedia.org/wiki/Kernel_Patch_Protection

    Kernel Patch Protection is the technology that enforces these restrictions. It works by periodically checking to make sure that protected system structures in the kernel have not been modified. If a modification is detected, then Windows will initiate a bug check and shut down the system, [6] [8] with a blue screen and/or reboot. The ...

  9. Windows Native API - Wikipedia

    en.wikipedia.org/wiki/Windows_Native_API

    When called from ntdll.dll in user mode, these groups are almost exactly the same; they execute an interrupt into kernel mode and call the equivalent function in ntoskrnl.exe via the SSDT. When calling the functions directly in ntoskrnl.exe (only possible in kernel mode), the Zw variants ensure kernel mode, whereas the Nt variants do not. [1]