Reliability Monitor > Event Viewer (for quick triage) Why? Timeline of crashes/updates with links to details, it's more faster to spot red Xs and warnings than go to Event Viewer. Reliability Monitor flow Launch: Win+R → perfmon /rel (or search “Reliability Monitor”). Scan the graph: Look for clusters around recent updates/driver installs. Drill in: Click a red X → View technical details for the Faulting module and Exception code. Act: Roll back a driver/update, repair the app, or run SFC/DISM if system files look implicated. Cross-check quickly if needed: Open Event Viewer → Windows Logs → Application and System to confirm the same error/time and informations.
How to use Reliability Monitor for quick troubleshooting
More Relevant Posts
-
I stumbled across how dangerous a single third-party Windows driver can be. No priv checks, no ACLs. Literally any user-mode app can throw IOCTLs straight into the kernel. The payoff? A full-blown info-leak right back into userland: real kernel addresses (KASLR gone in one shot), entire MajorFunction tables (CREATE, READ, WRITE, DEVICE_CONTROL), and even debug notes calling out hooks in CLASSPNP or ntoskrnl. Translation: a live X-ray of the kernel, handed out for free thanks to sloppy design. For red teams, that’s instant ring-0 recon on demand, no shellcode, no fancy chains. For blue teams, it’s nightmare fuel. Any random EXE can squeeze the driver and dump critical kernel telemetry. The lesson? One poorly written driver can nuke years of hardening and turn modern protections into pure theater. Big thanks to Saad for creating CETP. It provides real value in a market where detection capabilities are constantly evolving.
To view or add a comment, sign in
-
-
Alice and Bob walk into a quantum bar ⚛️ 𝐵𝑎𝑟𝑡𝑒𝑛𝑑𝑒𝑟: "Why handshake?" 𝐵𝑜𝑏: "Alice has the key, I’m on #ESP32." Sounds like #funForFriday, but it’s not just a joke. I turned this anecdote into a real demo: 👉https://lnkd.in/epGxnntT Linux server and an ESP32 as client building a post-quantum secure TCP channel in 6 steps 🔐: 1) Alice → Bob: send Kyber (ML-KEM-512) public key (post-quantum KEM) 2) Bob → Alice: encapsulate + send ciphertext 3) Both: decapsulate/derive → shared secret 4) Both: HKDF-SHA256 (extract + expand) → AES-256-GCM key 5) A → B: encrypted record `[IV | ciphertext | tag]` with seq-nr in AAD 6) B → A: encrypted record `[IV | ciphertext | tag]` with seq-nr in AAD This is a lightweight proof-of-concept showing #PQC between a PC and a microcontroller. I used a reference Kyber implementation (no platform optimizations): KEM-512 encapsulation on the ESP32 is about ~10 ms in my test. 𝐍𝐞𝐱𝐭 𝐬𝐭𝐞𝐩𝐬: * Swap in an ESP32-optimized implementation and measure speed vs resource use * Compare handshake and memory cost vs traditional TLS (ECDHE) * Incorporate the key exchange into some existing TLS 1.3 scheme (X25519Kyber512 or similar?) * Add authentication (this minimalist demo is currently vulnerable to MitM) PS: A & B are doomed if the bartender is Mallory, but okay if the bartender is Shor. 😉
To view or add a comment, sign in
-
-
'Context rot' is a really useful term to describe the deterioration in performance we see with LLMs as more and more tokens are included as input. Companies often announce '1m token context windows' etc. but in reality, models won't necessarily make good use of all this information. As Kelly Hong and colleagues put it: 'Whether relevant information is present in a model’s context is not all that matters; what matters more is how that information is presented.' More in their original piece on context rot: https://lnkd.in/eqkv6uBM
To view or add a comment, sign in
-
-
🚦 New Project Release: NJ Parkway Traffic Cameras Auto-Cycler 🚦 Happy Labor Day! For any traveling dts (down the shore), check out the traffic. I just published a new repo that makes it easy to watch and cycle through New Jersey Parkway traffic cameras using open .m3u8 HLS streams from the NJ Turnpike Authority. 🔗 Repo: Traffic-Cameras-Playlist-Auto-Cycler What’s inside: 📺 Playlist file (.m3u) → load into mpv or VLC to view all cams ⚡ Batch launcher → one-click Windows script that opens the full playlist 🔄 PowerShell auto-cycler → cycles through each camera automatically every N seconds 📌 Source: The camera URLs were collected from the NJTA official camera list, extracted via the DOM snapshot at urlscan.io. Replace URL list with any other camera sets in your area. Or, Northbound!
To view or add a comment, sign in
-
-
📘 New Tutorial: MILBOX-ORNX CAN Bus Interfaces Tutorial Explore how to test the CANBus interfaces on the rugged MILBOX‑ORNX in our latest guide. Whether you're working with defense systems or industrial edge applications, this tutorial walks you through every step with clarity and precision. 🔧 WHAT YOU WILL LEARN: 1- The pinout of CAN Bus connector 2- Examples of can-utils tools This tutorial helps you confidently connect and test CANBus interfaces using Linux commands—perfect if you're integrating advanced edge systems. 🔗 Read the full tutorial: https://lnkd.in/ddTvhJKM
To view or add a comment, sign in
-
Scrutiny v0.8 is out and now has a "showcase" mode that works with a virtual device. No need to have real hardware or instrument a firmware to be able to try it. Other notable recent additions are : - Support of CAN bus (Vector, ETAS, PCAN, KVASER, SocketCAN) - Possibility to remotely manage the firmwares installed on a server through the GUI (or SDK) - Supports of Tasking compiler - Trigger location is now drawn on an embedded graph - Cleaner CMake integration of the postbuild toolchain - And few bugfixes, of course! https://lnkd.in/eBRBVhyy
To view or add a comment, sign in
-
new #PCF control added: Multi Select Lookup For Subgrids by Fairoz khan https://lnkd.in/dqAQjTpj #PowerApps #PowerPlatform #PowerAppsComponentFramework #PCFGallery
To view or add a comment, sign in
-
Got it 👍 Here’s the short form fix for Rufus bootable USB not working: 1. Update Rufus → Download latest from rufus.ie. 2. Run as Admin → Right-click Rufus → Run as Administrator. 3. Check USB → Try different port (USB 2.0/3.0), or another pendrive. 4. Format USB → Use FAT32 (for UEFI) or NTFS (for Legacy). 5. BIOS Settings → Set USB first boot, disable Secure Boot if needed, switch UEFI/Legacy mode. 6. Check ISO → Re-download or verify checksum. 7. If still fails → Use alternatives like Etcher, Ventoy, Media Creation Tool. 👉 First try updating Rufus + formatting the USB, that fixes most cases. Do you want me to give you the direct latest Rufus download link?
To view or add a comment, sign in
-
-
Falcon Boot, A way of booting embedded applications without which a product might not be a "shippable product". Have you wondered, why some good Linux products (Excluding Computers) don't show a boot menu nor any boot logs. Also that their boot-times are less than 1-2 seconds. The reason is optimising boot for user experience. Slow boot-times means missing an opportunity to capture a moment and much more. To boot using falcon, some changes in compile-config were needed, some features had to be removed to make space. After using u-boot's documentation , bootlin's slides and some help from the u-boot maintainers , Voila. Although u-boot optimisation might not give more than a second of improvement. But in the bigger scheme, it might mean saving a lot of energy from sleep-wake cycles, no need of carrying DRAM current at sleep? CPU can sleep-tight. Total boot-time( from reset to shell): 2.8Seconds. Let's hope by the new year that fraction vanishes. :) #Linux #Embedded #EmbeddedLinux #uBoot #LinuxFoundation https://lnkd.in/g_UFZjtH
To view or add a comment, sign in
-
Hands-on Lab: Static Route & Floating Static Route In this lab, I applied the concept of Static Routing and also implemented a Floating Static Route to ensure connectivity even if the primary path goes down. 🔹 The idea in short: I have two devices (VPC and Windows) connected through a network of routers. I created two paths for communication between them: Primary path: R1 → R2 → Switch → Win Backup path: R1 → R3 → Switch → Win I prioritized the primary path by adjusting the Administrative Distance (AD): Primary: AD = 1 Backup: AD = 5 🔹 What happens: As long as the primary path is up, the router selects it automatically If the primary interface or link goes down, the router automatically switches to the backup path without manual intervention. 💡 Benefit: This approach ensures redundancy in the network and guarantees high availability of connectivity
To view or add a comment, sign in