• 1
    play
  • 1
    collected

Defrag Tools

Season 1 2012 - 2019

  • 2012-07-31T04:00:00Z
  • 45m
  • 6d 3h 45m (197 episodes)
  • United States
  • English
Andrew Richards, Chad Beeder and Larry Larsen host this deep dive into the tools used on the tech support show Defrag. Each Defrag Tools show focuses on a specific tool, going deep into a tool's features, explaining when and why you should use the tool, and provides experience based tips to get the most out of the tool.

197 episodes

Series Premiere

2012-07-31T04:00:00Z

1x01 Building your USB thumbdrive

Series Premiere

1x01 Building your USB thumbdrive

  • 2012-07-31T04:00:00Z45m

Welcome to the first episode of Defrag Tools where Andrew Richards and I will be walking you through the tools we use when troubleshooting Windows PC's. Each week we'll dive into the tools from SysInternals, showing you how to use them along with our best tips and tricks.

In this episode we'll be showing you how to get started by creating a thumb drive that you can use to fix PC's and troubleshoot problems.

2012-08-06T04:00:00Z

1x02 Process Explorer

1x02 Process Explorer

  • 2012-08-06T04:00:00Z45m

In this episode of Defrag Tools, Andrew and I walk you through Sysinternals Process Explorer. Process Explorer is a comprehensive replacement for Task Manager. It allows you to view the details of the processes running on the computer, both at a point in time and historically. The performance graphs allow you to view the CPU, I/O, Memory and GPU usage. Process Explorer can be used to find file locks, loaded DLLs, autostart locations, and many more things.

2012-08-13T04:00:00Z

1x03 Process Monitor

1x03 Process Monitor

  • 2012-08-13T04:00:00Z45m

1x04 Process Monitor - Examples

  • 2012-08-20T04:00:00Z45m

2012-08-27T04:00:00Z

1x05 Autoruns and MSConfig

1x05 Autoruns and MSConfig

  • 2012-08-27T04:00:00Z45m

In this episode of Defrag Tools, Chad and I walk you through Sysinternals Autoruns. We also look at its predecessors: MSConfig and SysEdit. AutoRuns and MSConfig allow you to view and disable autostart entries on the computer. The autostart entries are locations in the registry and file system that can cause applications and DLLs to be automatically run at startup, login, application launch, and at many more registration points in Windows.

2012-09-04T04:00:00Z

1x06 RAMMap

1x06 RAMMap

  • 2012-09-04T04:00:00Z45m

In this episode of Defrag Tools, Andrew and I walk you through Sysinternals RAMMap. RAMMap allows you to see how the Physical Memory (RAM) on the computer is being used. You can see how much RAM there is, for what purpose it is being used, and if there has been any memory pressure (not enough memory). We also cover a lot of Memory Management theory to understand the data in RAMMap.

2012-09-10T04:00:00Z

1x07 VMMap

1x07 VMMap

  • 2012-09-10T04:00:00Z45m

In this episode of Defrag Tools, Andrew and I walk you through Sysinternals VMMap. VMMap allows you to see how the Virtual Memory of a process is being used. You can see how much is used, for what purpose it is being used, and if there has been any memory leaks. Like last week with RAMMap, we cover some Memory Management theory to understand the data in VMMap.

2012-09-21T04:00:00Z

1x08 Mark Russinovich

1x08 Mark Russinovich

  • 2012-09-21T04:00:00Z45m

Mark Russinovich joins Andrew Richards and Larry Larsen on this episode of Defrag Tools to talk about the history of Sysinternals, his involvement with the Windows Internals book series and advice on Cybersecurity. Learn about new tools, retired tools and tools that never got completed. Get advice on troubleshooting. Get advice on how to survive a cyber attack. And much much more...

2012-09-24T04:00:00Z

1x09 ProcDump

1x09 ProcDump

  • 2012-09-24T04:00:00Z45m

2012-10-01T04:00:00Z

1x10 ProcDump - Triggers

1x10 ProcDump - Triggers

  • 2012-10-01T04:00:00Z45m

In this 3 part episode of Defrag Tools, Andrew Richards and Larry Larsen walk you through Sysinternals ProcDump. ProcDump allows you to capture the memory of a process running on the computer. The dump file can be of varying size and can be taken with varying outage durations. Dumps can be triggered immediately or can be triggered by a variety of events including CPU utilization, Memory utilization, a Performance Counter, a Hung Window and/or Native/Managed exceptions.

2012-10-15T04:00:00Z

1x12 TaskMgr and ResMon

1x12 TaskMgr and ResMon

  • 2012-10-15T04:00:00Z45m

In this episode of Defrag Tools, Chad Beeder and Larry Larsen walk you through Task Manager and Resource Monitor. Sometimes you can't download Sysinternals or other troubleshooting tools, at these time, you can turn to these in-box applications that allow you to investigate the computer.

2012-10-22T04:00:00Z

1x13 WinDbg

1x13 WinDbg

  • 2012-10-22T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Larry Larsen start walking you through the Debugging Tools for Windows (in particular WinDbg). WinDbg is a debugger that supports user mode debugging of a process, or kernel mode debugging of a computer.

This first WinDbg installment configures the system to open dumps files via an adjusted Context Menu. It shows how to set WinDbg as the (AeDebug) postmortem debugger, and how to use ProcDump v5.1 to do the same but capture the process as a dump file. It then starts to explain some basic concepts of debugging: call stacks (k), registers (r) and exception context records (.ecxr).

Make sure you watch Defrag Tools Episode #1 for instructions on how to get the Debugging Tools for Windows and how to set the required environment variables for symbols and source code resolution.

2012-11-12T05:00:00Z

1x14 WinDbg - SOS

1x14 WinDbg - SOS

  • 2012-11-12T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Larry Larsen continue looking at the Debugging Tools for Windows (in particular WinDbg). WinDbg is a debugger that supports user mode debugging of a process, or kernel mode debugging of a computer.

This installment shows how you can view the user mode call stack and stack variables in a native, managed (.NET) or Silverlight process. We use these commands:

dv
dt
!sos.dumpstack
!sos.dumpstackobjects / !sos.dso
!sos.dumpobj / !sos.do
!sos.printexception / !sos.pe
.frame
.f+
.f-
.load
.unload
.loadby
.chain
lm / lmm / lmvm
.extmatch
.prefer_dml 1
.lines
.ecxr
.cls

Make sure you watch Defrag Tools Episode #1 for instructions on how to get the Debugging Tools for Windows and how to set the required environment variables for symbols and source code resolution.

2012-11-19T05:00:00Z

1x15 WinDbg - Bugchecks (BSOD)

1x15 WinDbg - Bugchecks (BSOD)

  • 2012-11-19T05:00:00Z45m

In this episode of Defrag Tools, Chad Beeder and Larry Larsen discuss analyzing kernel mode bugchecks (colloquially known as Blue Screens of Death) using WinDbg from the Debugging Tools For Windows.

We use these commands:

!analyze -v
.hh
.trap
!pte
!process
!thread
.formats
.process
.thread
k
~
.reload

Make sure you watch Defrag Tools Episode #1 for instructions on how to get the Debugging Tools for Windows and how to set the required environment variables for symbols and source code resolution.

2012-11-26T05:00:00Z

1x16 WinDbg - Driver Verifier

1x16 WinDbg - Driver Verifier

  • 2012-11-26T05:00:00Z45m

Not all Blue Screens of Death are easy to debug! Sometimes, you need to enable extra checking to help catch a buggy device driver. In this episode of Defrag Tools, Chad Beeder and Larry Larsen discuss using Driver Verifier in conjunction with WinDbg to track down a driver which is corrupting kernel mode pool memory.

Debugger commands used:

!analyze -v
.trap
ub
dp
dps
dc
kv

Make sure you watch Defrag Tools Episode #1 for instructions on how to get the Debugging Tools for Windows and how to set the required environment variables for symbols and source code resolution.

1x17 WinDbg - Driver Verifier - Part 2

  • 2012-12-03T05:00:00Z45m

In this episode of Defrag Tools, Michael Fourre, senior test engineer from the Driver Verifier team, pays a visit to Larry Larsen and Chad Beeder in the Channel 9 studios to give us some deeper insight into this valuable tool for catching device driver bugs!

1x18 WinDbg - Driver Verifier - Part 3

  • 2012-12-10T05:00:00Z45m

In this followup to last week's episode of Defrag Tools, Michael Fourre, senior test engineer from the Driver Verifier team, gives us an overview of all the available verifier settings, and explains when you might need to use them.

2012-12-17T05:00:00Z

1x19 WinDbg - OCA

1x19 WinDbg - OCA

  • 2012-12-17T05:00:00Z45m

In this week's episode of Defrag Tools, Graham McIntyre, Senior Developer from the Windows Reliability team, gives us an overview of Online Crash Analysis (OCA). Graham describes OCA and how dump collection has been enhanced in Windows 8.

2012-12-24T05:00:00Z

1x20 WinDbg - Basic Commands

1x20 WinDbg - Basic Commands

  • 2012-12-24T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue looking at the Debugging Tools for Windows (in particular WinDbg). WinDbg is a debugger that supports user mode debugging of a process, or kernel mode debugging of a computer.

This installment goes over the commands used to show the state of debug session. It also shows some of the basic commands used to view process and thread information of a user mode process. We cover these commands:

version
vertarget
|
||
.sympath
.srcpath
.exepath
.extpath
.chain
!analyze -v
.bugcheck
!error
~
~NNs
~~[TID]s
~*k
~*r
!process 0 17
!threads
!findstack
!uniqstack
!peb
!teb
k=
dps
dpu
dpa
dpp
.reload /f
.reload /user
!gle
!tls

Make sure you watch Defrag Tools Episode #1 for instructions on how to get the Debugging Tools for Windows and how to set the required environment variables for symbols and source code resolution.

2013-01-01T05:00:00Z

1x21 WinDbg - Memory User Mode

1x21 WinDbg - Memory User Mode

  • 2013-01-01T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue looking at the Debugging Tools for Windows (in particular WinDbg). WinDbg is a debugger that supports user mode debugging of a process, or kernel mode debugging of a computer.

This installment goes over the commands used to show the memory used in a user mode debug session. We cover these commands:

!address -summary
!address
!vprot
!mapped_file

Make sure you watch Defrag Tools Episode #1 for instructions on how to get the Debugging Tools for Windows and how to set the required environment variables for symbols and source code resolution.

1x22 WinDbg - Memory Kernel Mode

  • 2013-01-07T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue looking at the Debugging Tools for Windows (in particular WinDbg). WinDbg is a debugger that supports user mode debugging of a process, or kernel mode debugging of a computer.

This installment goes over the commands used to show the memory used in a kernel mode debug session. We cover these commands:

!vm
!vm 1
!memusage 8
!poolused 2
!poolused 4
!poolfind
!pool
!pool 2
!pte

Make sure you watch Defrag Tools Episode #1 for instructions on how to get the Debugging Tools for Windows and how to set the required environment variables for symbols and source code resolution.

2013-01-14T05:00:00Z

1x23 Windows 8 SDK

1x23 Windows 8 SDK

  • 2013-01-14T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Larry Larsen upgrade the software we downloaded in Episode #1 to the Windows 8 (x86 &x64) and Windows RT (ARM) versions.

Resources:
Windows Software Development Kit (SDK) for Windows 8
Sysinternals
USB3 Debugging Cable
- Note, you must use a USB3 A-A cable designed for debugging, otherwise it will fry your box!

1x24 WinDbg - Critical Sections

  • 2013-01-21T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue looking at the Debugging Tools for Windows (in particular WinDbg). WinDbg is a debugger that supports user mode debugging of a process, or kernel mode debugging of a computer.

This installment goes over the commands used to diagnose a Critical Section hang in a user mode application. We start with an overview of the four synchronization primitives and then delve deep in to temporary hangs, orphaned Critical Sections and deadlocks. We use these commands:

~*k
~*kv
~
~~[TID]s
!cs
!cs
!locks

Make sure you watch Defrag Tools Episode #1 and Defrag Tools Episode #23 for instructions on how to get the Debugging Tools for Windows and how to set the required environment variables for symbols and source code resolution.

2013-01-28T05:00:00Z

1x25 WinDbg - Events

1x25 WinDbg - Events

  • 2013-01-28T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue looking at the Debugging Tools for Windows (in particular WinDbg). WinDbg is a debugger that supports user mode debugging of a process, or kernel mode debugging of a computer.

This installment goes over the commands used to diagnose an Event hang in a user mode application. We talk about single and multiple event hangs, automatic and manual events, waitable object handles and common design patterns that you will encounter. We use these commands:

~*k
~*kv
~
~~[TID]s
dp
!handle
!handle
.dumpdebug
!uniqstack
!findstack

Make sure you watch Defrag Tools Episode #1 and Defrag Tools Episode #23 for instructions on how to get the Debugging Tools for Windows and how to set the required environment variables for symbol and source code resolution.

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue looking at the Debugging Tools for Windows (in particular WinDbg). WinDbg is a debugger that supports user mode debugging of a process, or kernel mode debugging of a computer.

This installment goes over the commands used to diagnose Semaphores, Mutexes and (Waitable) Timers in a user mode application. For timers, we delve deep in to the kernel to gather more information about them. We use these commands:

!handle
!handle
!object
!object
!timer
!timer
ub @rip
dt nt!_KTHREAD

Make sure you watch Defrag Tools Episode #1 and Defrag Tools Episode #23 for instructions on how to get the Debugging Tools for Windows and how to set the required environment variables for symbol and source code resolution.

1x27 WinDbg - Configure Kernel Debugging

  • 2013-02-11T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue looking at the Debugging Tools for Windows (in particular WinDbg). WinDbg is a debugger that supports user mode debugging of a process, or kernel mode debugging of a computer.

This installment goes over the cables and configuration steps required to set up kernel mode debugging.

We use these BCDEdit commands:

bcdedit
bcdedit /dbgsettings
bcdedit /dbgsettings 1394 channel:42
bcdedit /dbgsettings net hostip:192.168.0.10 port:50000 key:a.b.c.d
bcdedit /debug on
bcdedit /debug off
In the debug session, we use these commands:

.crash
.dump /f
lm
!lmi
.reload /f
!drvobj
!drvobj 2
bl
bc *
be
bd
bp
bm
x
g

Make sure you watch Defrag Tools Episode #1 and Defrag Tools Episode #23 for instructions on how to get the Debugging Tools for Windows and how to set the required environment variables for symbol and source code resolution.

2013-02-18T05:00:00Z

1x28 WinDbg - Scheduling

1x28 WinDbg - Scheduling

  • 2013-02-18T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue looking at the Debugging Tools for Windows (in particular WinDbg). WinDbg is a debugger that supports user mode debugging of a process, or kernel mode debugging of a computer.

This installment goes over the Windows Scheduler. We look at Running, Ready and Waiting threads, and talks about the effect of Power Management on scheduling.

We use these commands:

!running
!running -t
!ready
!dpcs
!thread 17
!thread -1 17 (current thread)

Make sure you watch Defrag Tools Episode #1 and Defrag Tools Episode #23 for instructions on how to get the Debugging Tools for Windows and how to set the required environment variables for symbol and source code resolution.

2013-02-25T05:00:00Z

1x29 WinDbg - ETW Logging

1x29 WinDbg - ETW Logging

  • 2013-02-25T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue looking at the Debugging Tools for Windows (in particular WinDbg). WinDbg is a debugger that supports user mode debugging of a process, or kernel mode debugging of a computer.

This installment goes over the Event Tracing for Windows (ETW) buffers in a kernel mode dump or live session. The ETW buffers can be extracted from the dump and viewed using the Windows Performance Toolkit (WPT). The buffers give you insight in to what has beem happening recently on the computer.

We use these commands:

!wmitrace.strdump
!wmitrace.logsave 0xNN c:example.etl
!wmitrace.eventlogdump 0xNN
!wmitrace.help

Make sure you watch Defrag Tools Episode #1 and Defrag Tools Episode #23 for instructions on how to get the Debugging Tools for Windows and how to set the required environment variables for symbol and source code resolution. This episode shows how install the Windows Performance Toolkit.

2013-03-04T05:00:00Z

1x30 MCTS Windows Internals

1x30 MCTS Windows Internals

  • 2013-03-04T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen review MCP exam 70-660 - MCTS Windows Internals.

2013-03-11T04:00:00Z

1x31 ZoomIt

1x31 ZoomIt

  • 2013-03-11T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen walk you through Sysinternals ZoomIt. ZoomIt is a screen zoom and annotation tool for technical presentations that include application demonstrations. ZoomIt runs unobtrusively in the tray and activates with customizable hotkeys to zoom in on an area of the screen, move around while zoomed, and draw on the zoomed image.

2013-03-18T04:00:00Z

1x32 Desktops

1x32 Desktops

  • 2013-03-18T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen walk you through Sysinternals Desktops. Desktops allows you to organize your applications on up to four virtual desktops. We go under the covers and show how Desktops fits in to the Session, Window Station and Desktop object/security model.

** I didn't do a great job explaining Sessions/Window Stations/Desktops -- If you want to know about those concepts in detail, I suggest you watch Sysinternals Primer: Gems instead.

2013-03-25T04:00:00Z

1x33 CLR GC - Part 1

1x33 CLR GC - Part 1

  • 2013-03-25T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Maoni Stephens and Larry Larsen walk you through the CLR Garbage Collector. Maoni is the Principal developer for the GC on the CLR team.

2013-04-02T04:00:00Z

1x34 CLR GC - Part 2

1x34 CLR GC - Part 2

  • 2013-04-02T04:00:00Z45m

2013-04-08T04:00:00Z

1x35 CLR GC - Part 3

1x35 CLR GC - Part 3

  • 2013-04-08T04:00:00Z45m

2013-04-15T04:00:00Z

1x36 CLR GC - Part 4

1x36 CLR GC - Part 4

  • 2013-04-15T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Maoni Stephens and Larry Larsen continue walking you through the CLR Garbage Collector - specifically PerfView. Maoni is the Principal developer for the GC on the CLR team.

2013-04-22T04:00:00Z

1x37 JavaScript - Part 1

1x37 JavaScript - Part 1

  • 2013-04-22T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Amanda Silver and Larry Larsen start walking you through the debugging of JavaScript Windows Store applications with Visual Studio. Amanda is a Principal developer for the JavaScript engine used in Internet Explorer, Windows Store applications and Visual Studio.

2013-04-29T04:00:00Z

1x38 JavaScript - Part 2

1x38 JavaScript - Part 2

  • 2013-04-29T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Amanda Silver and Larry Larsen continue walking you through the debugging of JavaScript Windows Store applications with Visual Studio. Amanda is a Principal developer for the JavaScript engine used in Internet Explorer, Windows Store applications and Visual Studio.

1x39 Windows Performance Toolkit

  • 2013-05-06T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen starting walking you through the Windows Performance Toolkit (WPT).

2013-05-13T04:00:00Z

1x40 WPT - WPR & WPA

1x40 WPT - WPR & WPA

  • 2013-05-13T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue walking you through the Windows Performance Toolkit (WPT).

2013-05-20T04:00:00Z

1x41 WPT - Command Line

1x41 WPT - Command Line

  • 2013-05-20T04:00:00Z45m

2013-05-27T04:00:00Z

1x42 WPT - CPU Analysis

1x42 WPT - CPU Analysis

  • 2013-05-27T04:00:00Z45m

2013-06-03T04:00:00Z

1x43 WPT - Wait Analysis

1x43 WPT - Wait Analysis

  • 2013-06-03T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue walking you through the Windows Performance Toolkit (WPT). Example xPerf scripts.

2013-06-17T04:00:00Z

1x44 WPT - DiskIO Analysis

1x44 WPT - DiskIO Analysis

  • 2013-06-17T04:00:00Z45m

1x45 WPT - File & Registry Analysis

  • 2013-06-24T04:00:00Z45m

2013-07-08T04:00:00Z

1x46 WPT - Driver Analysis

1x46 WPT - Driver Analysis

  • 2013-07-08T04:00:00Z45m

2013-07-15T04:00:00Z

1x47 WPT - MiniFilter Analysis

1x47 WPT - MiniFilter Analysis

  • 2013-07-15T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue walking you through the Windows Performance Toolkit (WPT). Example xPerf scripts.

1x48 WPT - Memory Analysis - Pool

  • 2013-07-22T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue walking you through the Windows Performance Toolkit (WPT). This is part 1 of 3 episodes on memory usage/leaks. Example xPerf scripts.

1x49 WPT - Memory Analysis - VirtualAlloc

  • 2013-07-29T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue walking you through the Windows Performance Toolkit (WPT). This is part 2 of 3 episodes on memory usage/leaks. Example xPerf scripts.

1x50 WPT - Memory Analysis - Heap

  • 2013-08-05T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue walking you through the Windows Performance Toolkit (WPT). This is part 3 of 3 episodes on memory usage/leaks. Example xPerf scripts.

2013-08-12T04:00:00Z

1x51 Support Diagnostics

1x51 Support Diagnostics

  • 2013-08-12T04:00:00Z45m

In this two part series of Defrag Tools, Andrew Richards and Larry Larsen talk to Jeff Dailey, Director of diagnostics in Microsoft Support. In this episode, we cover the principals of data collection and analysis.

1x52 Microsoft Fix it Center Pro

  • 2013-08-19T04:00:00Z45m

In this two part series of Defrag Tools, Andrew Richards and Larry Larsen talk to Jeff Dailey, Director of diagnostics in Microsoft Support. In this episode, we talk about Microsoft Fix it Center Pro.

1x53 Crashes, Hangs and Slow Performance

  • 2013-08-26T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen talk about Crashes, Hangs and Slow Performance. We talk about how to approach these issues and list the tools that can help you analyze them.

2013-09-02T04:00:00Z

1x54 IE Favorites Crash

1x54 IE Favorites Crash

  • 2013-09-02T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen show you the analysis of a crash. The crash happens when Favorites is clicked in Internet Explorer. We show Andrew's debugging and troubleshooting steps to solve the issue.

2013-09-09T04:00:00Z

1x55 Bugcheck 0xAB Crash

1x55 Bugcheck 0xAB Crash

  • 2013-09-09T04:00:00Z45m

In this episode of Defrag Tools, Chad Beeder, Andrew Richards and Larry Larsen show you the analysis of a Bugcheck 0xAB (by C9'er David Grainger). We show Chad's debugging and troubleshooting steps to solve the issue.

2013-09-16T04:00:00Z

1x56 Explorer Hang

1x56 Explorer Hang

  • 2013-09-16T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen show you the analysis of a hang. The hang happens in Explorer when Windows-E is pressed - the folder window never appears. We show Andrew's debugging steps to solve the issue.

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen talk about Andrew's new job, configuring new systems with SSDs and HDDs, answer two questions from a viewer (Barry), and debug two crashes.

[So why is the audio weird in this episode? Well, Andrew accidently hit mute on his mic just before recording. Kaitlin came to the rescue and used the audio from Chad's mic, fixing the levels for hours - Thx Kaitlin]

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen talk about a Sysinternals Autoruns file from a viewer (Judy) for a slow booting system. We update Sysinternals and in doing so, we use Sysinternals Steams to show the (NTFS) alternate data stream used to save the Zone information of the download.

2013-10-07T04:00:00Z

1x59 Larry Osterman

1x59 Larry Osterman

  • 2013-10-07T04:00:00Z45m

In this episode of Defrag Tools, Larry Osterman joins Andrew Richards and Chad Beeder to talk about lots of random stuff from his 29ys at Microsoft; including the old days, Windows Audio, Windows 8.1 UI, and much more.

In this episode of Defrag Tools, Rob Paveza joins Andrew Richards and Larry Larsen to talk about Just My Code for JavaScript Windows Store Apps in Visual Studio 2013. We show how much easier debugging is with all of the JavaScript libraries (e.g. JQuery) filtered out.

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen talk about Sysinternals Disk Usage and Sysinternals Registry Usage. These tools are used to determine the size of Folder and Registry trees. We provide advice on how to free up disk space so you can upgrade to Windows 8.1 on a low-disk space system.

2013-10-28T04:00:00Z

1x62 Windows 8.1 - High DPI

1x62 Windows 8.1 - High DPI

  • 2013-10-28T04:00:00Z45m

In this episode of Defrag Tools, Chad Beeder, Andrew Richards and Larry Larsen talk about the High DPI support in Windows 8.1.

2013-11-04T05:00:00Z

1x63 Windows 8.1 - SDK

1x63 Windows 8.1 - SDK

  • 2013-11-04T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen walk you through the download of the Windows 8.1 SDK and the latest Sysinternals tools. We harvest the Debugging Tools for Windows, Windows Performance Toolkit, and Application Verifier files from the SDK. We also show some of the new WinDbg features.

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen walk you through a Windows Store Application crash dump. We show the Quality page of the Dev Dashboard and debug a dump with WinDbg.

In this episode of Defrag Tools, Jeffrey Richter joins Andrew Richards and Larry Larsen to talk about Windows Store Application development. We talk about all the books he's authored and what his company (Wintellect) is doing recently.

In this episode of Defrag Tools, Jeffrey Richter joins Andrew Richards and Larry Larsen to talk about the Wintellect Package Explorer. This new tool, associated with the Windows Runtime for C# book, allows you to view the properties of Store apps installed on your system, and help you manage them.

1x67 Windows 8.1 - Background Task Hang

  • 2013-12-02T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder walk you through a common issues in Background Task applications. We use a Windows Store 8.1 app sample to show how missing code affects the process, and how the process can be reported as having an Application Hang due to non-responsiveness.

1x68 Windows 8.1 - HTTP Request Crash

  • 2013-12-09T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder walk you through a common issues in Windows Store applications that use HTTP. We use a Windows Store 8.1 app sample to show how a missing exception handler affects the stability of the process.

1x69 Windows 8.1 - XML Load Crash

  • 2013-12-16T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder walk you through a common issues in Windows Store applications that use XML. We use a Windows Store 8.1 app sample to show how missing code affects the stability of the process.

1x70 Windows 8.1 - Interop Crash

  • 2013-12-23T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder walk you through a common issues in Windows Store applications that use Interop. We use a Windows Store 8.1 app sample to show how missing code affects the stability of the process.

2013-12-30T05:00:00Z

1x71 Message Analyzer - Part 1

1x71 Message Analyzer - Part 1

  • 2013-12-30T05:00:00Z45m

2014-01-06T05:00:00Z

1x72 Message Analyzer - Part 2

1x72 Message Analyzer - Part 2

  • 2014-01-06T05:00:00Z45m

In this episode of Defrag Tools, Paul Long joins Chad Beeder in this 3 part series on Message Analyzer.

2014-01-13T05:00:00Z

1x73 Message Analyzer - Part 3

1x73 Message Analyzer - Part 3

  • 2014-01-13T05:00:00Z45m

In this episode of Defrag Tools, Paul Long joins Chad Beeder in this 3 part series on Message Analyzer.

1x74 Frame.GetNavigationState Crash

  • 2014-01-20T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder walk you through a common issue in Windows Store applications that use Frame.GetNavigationState. We use a Windows Store 8.1 app sample to show how using complex objects as a parameter in navigation can cause serialization to raise an exception.

1x75 Windows 8.1 - FileNotFound Crash

  • 2014-01-27T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen walk you through a common issue in Windows Store applications that use Files. We use a Windows Store 8.1 app sample to show how missing code affects the stability of the process.

2014-02-03T05:00:00Z

1x76 Escalation Engineer

1x76 Escalation Engineer

  • 2014-02-03T05:00:00Z45m

In this episode of Defrag Tools, Trey Nash and Jason Epperly join Chad Beeder to talk about their roles as Escalation Engineers in CSS.

2014-02-10T05:00:00Z

1x77 WPT Example - CPU

1x77 WPT Example - CPU

  • 2014-02-10T05:00:00Z45m

In this episode of Defrag Tools, Trey Nash joins Chad Beeder to demonstrate how the Windows Performance Toolkit was used to solve a performance issue in a time sensitive application.

2014-02-17T05:00:00Z

1x78 WPT Example - Disk

1x78 WPT Example - Disk

  • 2014-02-17T05:00:00Z45m

In this episode of Defrag Tools, Jason Epperly joins Chad Beeder to demonstrate how the Windows Performance Toolkit was used to solve a performance issue while logging in to a system.

1x79 Microsoft Consulting Services

  • 2014-02-24T05:00:00Z45m

In this episode of Defrag Tools, Chad Beeder is joined by Steve Thomas to talk about Steve's role as a consultant for Microsoft Consulting Services.

2014-03-03T05:00:00Z

1x80 App-V

1x80 App-V

  • 2014-03-03T05:00:00Z45m

In this episode of Defrag Tools, Chad Beeder is joined by Steve Thomas to talk about Application Virtualization (App-V) troubleshooting techniques.

2014-03-10T04:00:00Z

1x81 Aaron Margosis

1x81 Aaron Margosis

  • 2014-03-10T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder are joined by Aaron Margosis to talk about the Sysinternals book he co-authored, and demos an Application Installation Recorder that leverages Process Monitor and PowerShell.

1x82 Performance Counters - Part 1

  • 2014-03-17T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen begin a multi-part series on how Performance Counters work and how to add them to an application. This episode focuses on the (statistical) counter types that determine how the (raw) data is reported.

1x83 Performance Counters - Part 2

  • 2014-03-24T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder continue a 3-part series on how Performance Counters work and how to add them to an application. This episode focuses on the XML manifest that you develop, that turns in to code when compiled with CTRPP.

1x84 Performance Counters - Part 3

  • 2014-03-31T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder continue a 3-part series on how Performance Counters work and how to add them to an application. This episode focuses on turning the XML manifest in to code (with CTRPP), and using the generated code in a sample application.

1x86 Sigcheck (plus: the Heartbleed bug)

  • 2014-04-14T04:00:00Z45m

In this episode of Defrag Tools, Chad Beeder and Larry Larsen discuss two topics: The Heartbleed bug, and the Sigcheck tool from Sysinternals.

2014-04-21T04:00:00Z

1x87 Windows 8.1 Update

1x87 Windows 8.1 Update

  • 2014-04-21T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards walks you through the download of the Windows 8.1 Update SDK, the Windows 8.1 Store App Samples, the latest Sysinternals tools, and the Wintellect Package Explorer. We harvest the Debugging Tools for Windows, Windows Performance Toolkit, and Application Verifier files from the SDK.

1x88 Symbol Folder Hierarchy - index2.txt

  • 2014-04-28T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder talk about how you can change the Symbol folder's hierarchy to be 2-Tier instead of 1-Tier - by adding an index2.txt file to the root.

2014-05-05T04:00:00Z

1x89 Symbol Folder Tools

1x89 Symbol Folder Tools

  • 2014-05-05T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder talk about 4 tools used to maintain your Symbol Store and Symbol Cache folders.

In this episode of Defrag Tools, Chad Beeder and Andrew Richards use FindStr, Sysinternals Strings and !pde.ssz to perform string searches and filtering.

2014-06-23T04:00:00Z

1x95 Scheduled Tasks

1x95 Scheduled Tasks

  • 2014-06-23T04:00:00Z45m

In this episode of Defrag Tools, Chad Beeder and Andrew Richards use the Scheduled Tasks MMC, Sysinternals Autoruns, at.exe, scdtasks.exe and PowerShell to manage the Task Scheduler.

1x96 Writing a Debugger Extension Part 1

  • 2014-06-30T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder start a new series on writing a Debugger Extension for the Debugging Tools for Windows. The series is based on a 3 part MSDN Magazine series that Andrew wrote back in early 2011.

1x100 Episode 100!!! - Campus Tour

  • 2014-07-28T04:00:00Z45m

This week we break out of the Channel 9 studios and visit the offices of Chad Beeder and Andrew Richards, and talk about some of the history of Buildings 22 and 26.

1x102 Writing a Debugger Extension Part 6

  • 2014-08-11T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder continue a series on writing a Debugger Extension for the Debugging Tools for Windows. The series is based on a 3 part MSDN Magazine series that Andrew wrote back in early 2011.

1x105 Writing a Debugger Extension Part 9

  • 2014-09-08T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder finish a series on writing a Debugger Extension for the Debugging Tools for Windows. The series is based on a 3 part MSDN Magazine series that Andrew wrote back in early 2011.

1x106 Larry Osterman - 30 Years - Part 1

  • 2014-09-15T04:00:00Z45m

In a two part special for Defrag Tools, Larry Osterman joins Larry Larsen, Andrew Richards and Chad Beeder to celebrate Larry's 30 years at Microsoft. We travel to the Microsoft Archives building to reminisce over a selection of products that Microsoft has produced over Larry's 30 year career.

1x107 Larry Osterman - 30 Years - Part 2

  • 2014-09-22T04:00:00Z45m

In this second part of a two part special for Defrag Tools, Larry Osterman joins Larry Larsen, Andrew Richards and Chad Beeder to celebrate Larry's 30 years at Microsoft. We continue looking around the Microsoft Archives building, reminiscing over a selection of products that Microsoft has produced over Larry's 30 year career.

Mark Russinovich and Thomas Garnier join Andrew Richards in this episode of Defrag Tools. We talk about their new tool - Sysinternals System Monitor.

System Monitor (Sysmon) is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows event log. It provides detailed information about process creations, network connections, and changes to file creation time.

In this episode of Defrag Tools, Andrew Richards starts a two part series on writing a Debugger Extension in C# for the Debugging Tools for Windows. The series follows on from the recent 9 part series on writing a Debugger Extension in C++.

The C# code utilizes the Microsoft.Diagnostics.Runtime (CLRMD) and DllExports packages, available on NuGet.

In this episode of Defrag Tools, Andrew Richards finishes a two part series on writing a Debugger Extension in C# for the Debugging Tools for Windows. The series follows on from the recent 9 part series on writing a Debugger Extension in C++.

The C# code utilizes the Microsoft.Diagnostics.Runtime (CLRMD) and DllExports packages, available on NuGet.

In this of Defrag Tools, Kraig Brockschmidt joins Andrew Richards and Chad Beeder for two episodes to talk about Windows Store Application development using HTML, CSS and JavaScript. Be sure to download the free ebook!

In this of Defrag Tools, Kraig Brockschmidt joins Andrew Richards and Chad Beeder for a second episode to talk about Windows Store Application development using HTML, CSS and JavaScript. Be sure to download the free ebook!

2014-11-03T05:00:00Z

1x113 PerfView Part 1

1x113 PerfView Part 1

  • 2014-11-03T05:00:00Z45m

In this episode of Defrag Tools, Vance Morrison joins Andrew Richards and Chad Beeder to discuss his performance analysis tool, PerfView. In part 1 of this series, we demonstrate downloading and installing the tool, and collecting traces.

2014-11-10T05:00:00Z

1x114 PerfView Part 2

1x114 PerfView Part 2

  • 2014-11-10T05:00:00Z45m

In this episode of Defrag Tools, Vance Morrison joins Andrew Richards and Chad Beeder to discuss his performance analysis tool, PerfView. In part 2 of this series, we review a trace for CPU issues.

2014-11-17T05:00:00Z

1x115 PerfView Part 3

1x115 PerfView Part 3

  • 2014-11-17T05:00:00Z45m

In this episode of Defrag Tools, Vance Morrison joins Andrew Richards and Chad Beeder to discuss his performance analysis tool, PerfView. In part 3 of this series, we focus on looking at memory issues.

2014-11-24T05:00:00Z

1x116 PerfView Part 4

1x116 PerfView Part 4

  • 2014-11-24T05:00:00Z45m

In this episode of Defrag Tools, Vance Morrison joins Andrew Richards and Chad Beeder to discuss his performance analysis tool, PerfView. In part 4 of this series, we focus on using PerfView as a diagnostics tool.

2014-12-01T05:00:00Z

1x117 PerfView Part 5

1x117 PerfView Part 5

  • 2014-12-01T05:00:00Z45m

In this episode of Defrag Tools, Vance Morrison joins Andrew Richards and Chad Beeder to discuss his performance analysis tool, PerfView. In part 5 of this series, we focus on using PerfView as a diagnostics tool.

2014-12-08T05:00:00Z

1x118 PerfView Part 6

1x118 PerfView Part 6

  • 2014-12-08T05:00:00Z45m

In this episode of Defrag Tools, Vance Morrison joins Andrew Richards and Chad Beeder to discuss his performance analysis tool, PerfView. In part 6 of this series, we show how easy it is to add ETW events to your applications, and how these events can be seen in PerfView.

1x119 Windows Management Instrumentation

  • 2014-12-15T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder to discuss Windows Management Instrumentation (WMI).

2014-12-22T05:00:00Z

1x120 PerfView Part 7

1x120 PerfView Part 7

  • 2014-12-22T05:00:00Z45m

In this episode of Defrag Tools, Vance Morrison joins Andrew Richards and Chad Beeder to discuss his performance analysis tool, PerfView. In part 7 of this series, we show how easy it is to analyze ETW events with PerfView.

2014-12-29T05:00:00Z

1x121 DebugDiag Part 1

1x121 DebugDiag Part 1

  • 2014-12-29T05:00:00Z45m

In this episode of Defrag Tools, Wade Mascia joins Andrew Richards and Chad Beeder to discuss his debugging analysis tool, DebugDiag. In part 1 of this 4 part series, we show the basic features of DebugDiag.

2015-01-05T05:00:00Z

1x122 DebugDiag Part 2

1x122 DebugDiag Part 2

  • 2015-01-05T05:00:00Z45m

In this episode of Defrag Tools, Wade Mascia joins Andrew Richards and Chad Beeder to discuss his debugging analysis tool, DebugDiag. In part 2 of this 4 part series, we continue delving in to the features of DebugDiag.

2015-01-12T05:00:00Z

1x123 DebugDiag Part 3

1x123 DebugDiag Part 3

  • 2015-01-12T05:00:00Z45m

In this episode of Defrag Tools, Wade Mascia joins Andrew Richards and Chad Beeder to discuss the debugging analysis tool, DebugDiag. In part 3 of this 4 part series, we continue delving in to the features of DebugDiag.

2015-01-19T05:00:00Z

1x124 DebugDiag Part 4

1x124 DebugDiag Part 4

  • 2015-01-19T05:00:00Z45m

In this episode of Defrag Tools, Wade Mascia joins Andrew Richards and Chad Beeder to discuss the debugging analysis tool, DebugDiag. In part 4 of this 4 part series, we continue delving in to the features of DebugDiag.

2015-01-26T05:00:00Z

1x125 PerfView - Part 8

1x125 PerfView - Part 8

  • 2015-01-26T05:00:00Z45m

In this episode of Defrag Tools, Vance Morrison joins Andrew Richards and Chad Beeder to discuss his performance analysis tool, PerfView. In part 8 of this series, we show how to analyze the GC with PerfView.

In this episode of Defrag Tools, Andy Sterland joins Chad Beeder to discuss the IE F12 Developer Tools, including some of the new features available in the Windows 10 Tech Preview.

In this episode of Defrag Tools, David Stephens joins Andrew Richards to discuss the IE F12 Console, including some of the new features available in the Windows 10 Tech Preview.

2015-03-16T04:00:00Z

1x128 Networking - Part 1

1x128 Networking - Part 1

  • 2015-03-16T04:00:00Z45m

In the next two episodes of Defrag Tools, Andrew Richards and Chad Beeder discuss Networking. We look at various inbox tools, including ipconfig, route, netstat, arp, nslookup, tracert, ping, psping, net and netsh.

2015-03-23T04:00:00Z

1x129 Networking - Part 2

1x129 Networking - Part 2

  • 2015-03-23T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder continue to discuss Networking. We look at more inbox tools (netsh, tracert, ping, psping, net) and talk about Receive-Side Scaling (RSS), TCP Chimney Offload and the TCP Receive Window.

Season Finale

2015-03-30T04:00:00Z

1x130 Services

Season Finale

1x130 Services

  • 2015-03-30T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder discuss services in Windows. We look at several tools for managing services, and discuss how they are implemented.

2015-06-29T04:00:00Z

1x131 Windows 10 SDK

1x131 Windows 10 SDK

  • 2015-06-29T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder walk you through the download of the Windows 10 SDK and the latest Sysinternals tools. We harvest the Debugging Tools for Windows, Windows Performance Toolkit, and Application Verifier files from the SDK.

2015-07-06T04:00:00Z

1x132 PATH

1x132 PATH

  • 2015-07-06T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder bring sense the to Windows Search Path (%PATH%).

2015-07-13T04:00:00Z

1x133 App Paths

1x133 App Paths

  • 2015-07-13T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder look in to why Win-R can launch some apps, but the Command Prompt can't.

1x134 Microsoft Symbol Proxy (SymProxy)

  • 2015-07-20T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder look in to Microsoft Symbol Proxy (SymProxy). SymProxy is used to cache symbols (positive and negative) from one or more upstream symbols servers. We cover the installation into IIS, and the monitoring via Performance Monitor and Event Viewer.

In this episode of Defrag Tools, Andrew Richards and Chad Beeder use Debugging Tools for Windows (WinDbg) to determine the root cause of various application crashes which have occurred on Andrew's computer.

In this episode of Defrag Tools, Andrew Richards and Chad Beeder use Debugging Tools for Windows (WinDbg) to dig into a few more application crashes which have occurred on Andrew's computer.

In this episode of Defrag Tools, Andrew Richards and Chad Beeder use Debugging Tools for Windows (WinDbg) to debug some kernel mode memory dumps. We investigate a kernel mode crash (BSOD), and a system hang.

1x138 Debugging - 'dx' Command Part 1

  • 2015-08-24T04:00:00Z45m

In this two part series of Defrag Tools, Bill Messmer joins Andrew Richards and Chad Beeder to talk about the new 'dx' command in the Windows Debugger.

1x139 Debugging - 'dx' Command Part 2

  • 2015-08-31T04:00:00Z45m

In this second episode of a two part series of Defrag Tools, Bill Messmer joins Andrew Richards and Chad Beeder to talk about the new 'dx' command in the Windows Debugger.

1x140 Larry Osterman - 31 Years

  • 2015-09-07T04:00:00Z45m

In a two part on-location special for Defrag Tools, Andrew Richards and Chad Beeder invade Larry Osterman's office on his 31st anniversary at Microsoft. This week, we talk about his various office moves and the collection of artifacts in his office. Next week we continue the visit and do a deep dive in to API Contracts. API Contracts are used to define and package the various Windows 10 SKUs for PC, Phone, HoloLens, Surface Hub, Xbox, IoT, etc.

1x141 Larry Osterman - API Contracts

  • 2015-09-14T04:00:00Z45m

In a two part on-location special for Defrag Tools, Andrew Richards and Chad Beeder invade Larry Osterman's office on his 31st anniversary at Microsoft.

Last week, we talked about his various office moves and the collection of artifacts in his office.

This week we continue the visit and do a deep dive in to API Contracts. API Contracts are used to define and package the various Windows 10 SKUs for PC, Phone, HoloLens, Surface Hub, Xbox, IoT, etc.

1x142 Raymond Chen - Old New Thing

  • 2015-10-05T04:00:00Z45m

In this on-location special for Defrag Tools, Andrew Richards and Chad Beeder invade Raymond Chen's office. Raymond is a 23yr veteran of Microsoft, who's worked on everything from MS-DOS to the Windows 10 UI.

We talk about his Blog and Book Old New Thing, Security Reports on the wrong side of the Airtight Hatchway, various Microspeak terms including 'North Star' and Bedlam, Code Samples, and lot's of other random stuff.

In a two part special for Defrag Tools, Raymond Chen joins Andrew Richards and Chad Beeder to celebrate the 30 years of Windows. We travel to the Microsoft Archives building to reminisce over a selection of products that Microsoft has produced over the 30 years.

This was meant to be the second part of a two part special for Defrag Tools, where Raymond Chen joins Andrew Richards and Chad Beeder to celebrate the 30 years of Windows by walking around the Microsoft Archives.

Unfortunately, we hit a technical issue. We didn't realize until editing that we filled the (separate) device used to record the microphones. As a result, no audio - and thus no Part 2 this week. (We cut last week's episode at the point where we started to walk around off-camera, and soon after lost audio).

Stay tuned for more computer history next week. Chad takes us to the Living Computer Museum in downtown Seattle.

2015-11-16T05:00:00Z

1x145 Living Computer Museum

1x145 Living Computer Museum

  • 2015-11-16T05:00:00Z45m

In this special episode of Defrag Tools, following up on our most recent expeditions through the Microsoft Archives, Chad Beeder visits the Living Computer Museum in Seattle, and takes a hands-on trip through their extensive collection of Microsoft-related artifacts, with tour guide Aaron Alcorn.

2015-11-23T05:00:00Z

1x146 WinDiff

1x146 WinDiff

  • 2015-11-23T05:00:00Z45m

[01:20] - WinDiff
[02:55] - x64 version available on Defrag Tools OneDrive
[04:53] - File or Directory compare
[10:22] - Alt-B (Both), Alt-L (Left), Alt-R (Right)
[11:40] - F7 (Previous Change), F8 (Next Change)
[13:00] - Outline/Expand (Esc)
[14:44] - Tab Width (4 characters instead of 8 characters)
[18:00] - Email us your issues at [email protected]

2015-12-08T05:00:00Z

1x147 Dependency Walker

1x147 Dependency Walker

  • 2015-12-08T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder talk about Dependency Walker. A tool used to view the DLL Import dependencies of EXEs and DLLs, and to view the Exports.

2015-12-14T05:00:00Z

1x148 Windows Installer - ORCA

1x148 Windows Installer - ORCA

  • 2015-12-14T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder talk about Windows Installer and the ORCA Editor. The ORCA Editor is used to view and author Windows Installer files (*.msi, *.msm, *.msp, *.mst).

1x149 Media eXperience Analyzer Part 1

  • 2015-12-21T05:00:00Z45m

In this episode of Defrag Tools, Chad Beeder is joined by Jorge Novillo and Jose Baldner to introduce us to Media eXperience Analyzer (MXA).

Media eXperience Analyzer (formerly WindowsXRay) is a tool used to visualize ETW traces, with a particular emphasis on media scenarios such as audio/video capture and playback.

In this episode of Defrag Tools, Chad Beeder is joined by Jorge Novillo and Jose Baldner. We look at some of the technologies introduced in recent Windows versions to reduce power consumption and improve battery life during video playback on newer hardware, and use Media eXperience Analyzer (MXA) to see whether they are working.

In this episode of Defrag Tools, Chad Beeder and Jorge Novillo continue a series on Media eXperience Analyzer (MXA). We examine an audio glitch scenario, and show how to use MXA to determine what caused the problem.

In this episode of Defrag Tools, Chad Beeder and Jorge Novillo continue a series on Media eXperience Analyzer (MXA). We examine a video glitch scenario, and show how to use MXA to determine what caused the problem.

In this episode of Defrag Tools, Chad Beeder and Jorge Novillo wrap up a series on Media eXperience Analyzer (MXA). We examine one more audio glitch scenario, and show how to use MXA to determine what caused the problem.

1x154 Memory Footprint and Leaks

  • 2016-02-22T05:00:00Z45m

In this episode of Defrag Tools, Chad Beeder and Sylvain Goyette discuss how to diagnose issues related to memory usage, using tools available in the Assessment and Deployment Kit (ADK).

We cover two scenarios:

  1. Looking at the baseline memory footprint of a particular Windows installation, and comparing it to the usage during a certain activity

  2. Diagnosing memory usage and leaks in a particular app.

2016-02-29T05:00:00Z

1x155 Boot Performance

1x155 Boot Performance

  • 2016-02-29T05:00:00Z45m

In this episode of Defrag Tools, Chad Beeder and Sylvain Goyette discuss how to analyze and optimize Windows boot performance, using tools available in the Assessment and Deployment Kit (ADK).

In this episode of Defrag Tools, Chad Beeder and Sylvain Goyette demonstrate how to do critical path analysis in Windows Performance Analyzer (WPA), to troubleshoot apps which have an unresponsive UI. WPA is available in the Assessment and Deployment Kit (ADK).

1x157 Energy Estimation Engine (E3)

  • 2016-03-28T04:00:00Z45m

Collecting and visualizing Windows 10 Energy Estimation Engine (E3) data with "powercfg /srumutil" and Excel

In this episode of Defrag Tools, Chad Beeder and Jorge Novillo take a look at the Energy Estimation Engine (E3) in Windows, and how to use it to get detailed information about battery usage.

Note: In addition to viewing data from a single device, as demonstrated in the video, an OEM, during device pre-production, or an enterprise IT administrator could create domain scripts to generate and collect E3 SRUMUTIL logs on a daily or weekly basis and collect the information in a database. This would allow the OEM or enterprise to analyze energy usage data from devices, and identify opportunities to improve battery life on their Windows images.

In this episode of Defrag Tools, Chad Beeder and Jorge Novillo discuss a power saving feature in Windows: hardware offloading of Audio Processing Objects (APOs). We demonstrate how to use Media eXperience Analyzer (MXA) to determine whether audio offload is working on a given system.

2016-04-11T04:00:00Z

1x159 Powercfg

1x159 Powercfg

  • 2016-04-11T04:00:00Z45m

In this episode of Defrag Tools, Chad Beeder and Andrew Richards discuss the Powercfg command-line tool in Windows, which allows you to configure power management settings, and analyze power and battery usage.

2016-04-18T04:00:00Z

1x160 PsPing

1x160 PsPing

  • 2016-04-18T04:00:00Z45m

In this episode of Defrag Tools, Chad Beeder and Andrew Richards discuss the PsPing command-line tool from Sysinternals - a more powerful replacement for the default "ping" command, which also adds additional capabilities such as bandwidth measurement.

1x161 Troubleshooting a Slow PC

  • 2016-04-25T04:00:00Z45m

In this episode of Defrag Tools, Chad Beeder and Andrew Richards walk through using various tools to determine what is causing Andrew's computer to be slow and unresponsive.

1x162 Defrag Show Crossover - Gov Maharaj

  • 2016-05-09T04:00:00Z45m

In the spirit of Star Trek crossovers, Andrew Richards and Chad Beeder pay a visit to Gov (Rhymes With Orange) Maharaj, the co-host of The Defrag Show. We talk about how each series got started, the focus of each, and how the two sometimes overlap.

Gov has a wealth of knowledge, a lot of it being garnered from his role as a developer on the Windows Application and Device Compatibility Team for over 16+ years, but also by doing research for you, to answer your questions.

In this episode we cover a lot of things, but of note, we talk about the version of Windows. How it is reported to applications and drivers, and the common misconception that the version number represents functionality.

We've previously taped in Studio F when visiting Raymond Chen. And we've previously talked about API Contacts with Larry Osterman. As mentioned while in the kitchen, Bill Gates made a Coke (Coca-Cola) commercial years ago.

In this episode of Defrag Tools, Chad Beeder and Andrew Richards discuss Virtual Hard Disk (VHD) files. We first dive into what a VHD is, how you can boot from a VHD by configuring bcdedit settings, and we see how they look in Disk Management. We then use Sysinternals Disk2VHD - a quick and easy way to make a VHD from a Physical drive. We also discuss the Volume Shadow Copy Service.

In this episode of Defrag Tools, Mark Russinovich and Andrew Mason (Program Manager for Nano Server) join Andrew Richards to discuss the release of the Sysinternals tools for Windows Server - Nano Server.

Over 40 of the Sysinternals tools have been updated to support the headless execution on Nano Server via a remote shell (e.g. PowerShell, PsExec, SSH). You can download the full set by clicking on the Sysinternals Nano Server Suite on the Sysinternals suite page, and each tool that supports Nano Server reports that on its download page. The Nano versions are also compatible with 64-bit Windows and have "64.exe" as their suffix in the download files. Many of the updated tools include bug fixes as well.

1x165 Performance tracing in OOBE

  • 2016-08-08T04:00:00Z45m

In this episode of Defrag Tools, Sylvain Goyette joins Chad Beeder to talk about how to collect performance traces during Windows OOBE (Out of Box Experience).
(Sorry that Sylvain's screen is somewhat hard to read; we had some technical issues with the screen capture session.)

1x166 Performance Analysis of UWP Apps

  • 2016-08-15T04:00:00Z45m

In this episode of Defrag Tools, Sylvain Goyette joins Chad Beeder to discuss performance tracing of Universal Windows Platform (UWP) apps.
(Sorry that Sylvain's screen is somewhat hard to read; we had some technical issues with the screen capture session.)

In this episode of Defrag Tools, Andrew Richards and Chad Beeder use Debugging Tools for Windows (WinDbg) to determine the root cause of various application crashes which have occurred on Andrew's computer. We use Sysinternals ProcDump to capture the dumps.
While debugging, we take a side trip into configuring colors for Compressed and Encrypted files in Windows Explorer, and use Sysinternals Process Monitor to determine why the debugger was getting an Access Denied when loading the PDE Debugger Extension.

2016-09-19T04:00:00Z

1x168 Powercfg Sleep Study

1x168 Powercfg Sleep Study

  • 2016-09-19T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder talk to Nashaat Soliman and Paresh Maisuria (program manager and developer from the Windows kernel power team) about the "Sleep Study" feature in the Powercfg tool, and how you can use it to diagnose battery drain issues on Modern Standby systems.
For related content on power management and analysis using Powercfg, refer to the following earlier episodes:
Defrag Tools #157 - Energy Estimation Engine (E3)
Defrag Tools #159 - Powercfg
For additional details on Sleep Study, see this blog post:
Sleep Study: Diagnose what's draining your battery while the system sleeps

1x169 Debugging Tools for Windows Team

  • 2016-09-26T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards talks to Andy Luhrs and Bill Messmer from the Debugging Tools for Windows team. We talk about what the team develops, what it is working on, the debugger object model, their blog and their feedback email address.

Blog - https://blogs.msdn.microsoft.com/windbg/
Email - [email protected]

1x170 Debugger - JavaScript Scripting

  • 2016-10-03T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards talks to Andy Luhrs and Bill Messmer from the Debugging Tools for Windows team. We talk about the new JavaScript extensibility and scripting abilities in WinDbg available in the WDK and SDK build 14951 and newer.
Blog - https://blogs.msdn.microsoft.com/windbg/
Email - [email protected]
 Bill leveraged the debugger object model previously in these episodes:
Defrag Tools #138 - Debugging - 'dx' Command Part 1
Defrag Tools #139 - Debugging - 'dx' Command Part 2
Defrag Tools #169 - Debugging Tools for Windows Team

1x171 Application Insights Profiler

  • 2016-12-12T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder talk to Dan Taylor and Chuck Weininger about Application Insights Profiler. The profiler allows you to get detailed performace data from Azure App Services.
How to - http://aka.ms/aiprofilerpreview
Email - [email protected]

2017-01-09T05:00:00Z

1x172 Application Hangs

1x172 Application Hangs

  • 2017-01-09T05:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder talk about Application Hangs. We collect a dump of a process and debug it with the Debugging Tools for Windows.
Resources:
Defrag Tools: #24 - WinDbg - Critical Sections
Defrag Tools: #25 - WinDbg - Events
Defrag Tools: #26 - WinDbg - Semaphores, Mutexes and Timers

In this episode of Defrag Tools, Andrew Richards and Chad Beeder are joined by Aaron Margosis, the co-author of the Sysinternals book -- now in its 2nd Edition!

In this episode of Defrag Tools, Andrew Richards and Chad Beeder are joined by Aaron Margosis. We talk about the Security Baseline for Windows 10. We also look at the Policy Analyzer and Local Group Policy Objects (LGPO) tools.

1x175 Debugging the Network Stack

  • 2017-03-06T05:00:00Z45m

In this episode of Defrag Tools, Chad Beeder is joined by Jeffrey Tippet from the Windows Networking team to talk about how to debug networking problems in NDIS (Network Driver Interface Specification) using the !ndiskd debugger extension in WinDbg.

1x176 CMD and PowerShell Context Menus

  • 2017-03-13T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder delve into the way the Shell uses the registry to provide the Right-Click behavior of a (File Explorer) Folder.
We add sub-menus to the Directory context menu, allowing a Command Prompt or PowerShell prompt to be opened in the current folder, either elevated and non-elevated.
The registry file created is provided on Andrew's MSDN blog (Where in the API is Andrew Richards?), and the Defrag Tools OneDrive.

In this episode of Defrag Tools, Andrew Richards and Chad Beeder are joined by Alex Ionescu and Pavel Yosifovich, authors of the Windows Internals 7th Edition Part 1 book.
We talk to Alex in the Channel 9 Studio and to Pavel over Skype from Israel. We cover the history of the Windows Internals book series, Alex's involvement in writing the 6th Edition and their co-authorship of the 7th Edition.
The Windows Internals 7th Edition Part 1 is based on Windows 10 Curators Update, and is a must-have for any Troubleshooter or Developer!
The Part 1 book covers:
Understand Windows system architecture and its most important entities, such as processes and threads
Examine how processes manage resources and threads scheduled for execution inside processes
Observe how Windows manages virtual and physical memory
Dig into the Windows I/O system and see how device drivers work and integrate with the rest of the system
Go inside the Windows security model to see how it manages access, auditing, and authorization, and learn about the new mechanisms in Windows 10 and Windows Server 2016

1x178 Sysinternals ProcDump v9.0

  • 2017-06-05T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder talk about the new features of Sysinternals ProcDump v9.0
Multiple Dumps per trigger in multiple Dump Sizes:
-mm Write a 'Mini' dump file. (default) Includes the Process, Thread, Module, Handle and Address Space info
-ma Write a 'Full' dump file. Includes All the Image, Mapped and Private memory
-mp Write a 'MiniPlus' dump file. Includes all Private memory and all Read/Write Image or Mapped memory. To minimize size, the largest Private memory area over 512MB is excluded. A memory area is defined as the sum of same-sized memory allocations. The dump is as detailed as a Full dump but 10%-75% the size. Note: CLR processes are dumped as Full (-ma) due to debugging limitations
-mc Write a 'Custom' dump file. Include memory defined by the specified MINIDUMP_TYPE mask (Hex). -md Write a 'Callback' dump file. Include memory defined by the MiniDumpWriteDump callback routine named MiniDumpCallbackRoutine of the specified DLL
-mk Also write a 'Kernel' dump file. Includes the kernel stacks of the threads in the process. OS doesn't support a kernel dump (-mk) when using a clone (-r). When using multiple dump sizes, a kernel dump is taken for each dump size
Kernel Dump Support:
Complete Thread Stack – Kernel & User
Open the User and Kernel Dumps in separate debuggers
Match the TIDs from the User Dump, with the TIDs from the Kernel Dump, to get the entire stack
Awesome tool for hang debugging!
Debugging the Kernel Dump
Dump includes the kernel stack (memory) of every thread in the process (Running, Ready or Idle)
Dump has the Process PID and each Thread TID. There is no PEB or TEB information.
View the Kernel Call Stack for each Thread in the Process:

!process -1 17

Debugging the User Dump
View the User Call Stack for each Thread in the Process (e.g.):

~*k
!pde.deep

1x179 Manually Generating a Crash Dump

  • 2017-06-12T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards and Chad Beeder walk through the process of manually creating a full memory dump via the keyboard. This is useful when you want to capture the state of the operating system. For example, to debug a hang.

2017-06-19T04:00:00Z

1x180 Active Memory Dump

1x180 Active Memory Dump

  • 2017-06-19T04:00:00Z45m

In this episode of Defrag Tools, Graham McIntyre joins Andrew Richards and Chad Beeder to talk about the new Active Memory Dump type. This new kernel dump size replaces the Complete Memory Dump type, and although much smaller, is equally as useful.

2017-06-26T04:00:00Z

1x181 System Power Report

1x181 System Power Report

  • 2017-06-26T04:00:00Z45m

In this episode of Defrag Tools, Chad Beeder and Andrew Richards are joined by Paresh Maisuria from the Windows Kernel Power team and Zach Holmes from the Fundamentals team to talk about System Power Report, a new feature in Windows 10 Creators Update.

2017-08-28T04:00:00Z

1x182 WinDbg Preview Part 1

1x182 WinDbg Preview Part 1

  • 2017-08-28T04:00:00Z45m

In this episode of Defrag Tools, Chad Beeder is joined by Tim Misiak and Andy Luhrs to introduce WinDbg Preview, a new version of the WinDbg tool.

2017-08-28T04:00:00Z

1x183 WinDbg Preview Part 2

1x183 WinDbg Preview Part 2

  • 2017-08-28T04:00:00Z45m

In this episode of Defrag Tools, Chad Beeder is joined by Nickolay Ratchev and Tim Misiak to show off some features of WinDbg Preview, a new version of the WinDbg tool.

1x184 JavaScript in WinDbg Preview

  • 2017-09-18T04:00:00Z45m

In this episode of Defrag Tools, we continue our series on the new WinDbg Preview. Andrew Richards is joined by Bill Messmer to talk about the updated scripting engine.

In this episode of Defrag Tools, Chad Beeder is joined by James Pinkerton and Ivette Carreras to introduce a new feature of WinDbg Preview: Time Travel Debugging (TTD).

1x186 Time Travel Debugging - Advanced

  • 2017-10-23T04:00:00Z45m

In this episode of Defrag Tools, Andrew Richards is joined by JCAB (Juan Carlos Arevalo Baeza) and Jordi Mola from the Windows Debugger team to demonstrate some more advanced usage of a new feature of WinDbg Preview: Time Travel Debugging (TTD).

2017-10-30T04:00:00Z

1x187 Ninjacat Unicorn

1x187 Ninjacat Unicorn

  • 2017-10-30T04:00:00Z45m

In this episode of Defrag Tools, Chad Beeder and Andrew Richards talk to Marc Goodner and Reid Borsuk about the maker community at Microsoft, and the cool Ninjacat statue they built. Make sure to watch to the end to see all of its, shall we say... special features!

1x188 Cyber Monday - What tech to buy?

  • 2017-11-27T05:00:00Z45m

In this episode of Defrag Tools, Chad Beeder and Andrew Richards talk about what tech you could buy on Cyber Monday.
We talk about USB Sticks, USB Cables, MicroSD Readers, International Power Adapters, Charging Stations, UPS Backup, Network Testers, Memory Sticks, Disk Drives, Drive adapters, Xbox Live, Xbox Game Pass, ... and many more things.
For Intel Product Specs (to determine supported RAM, etc.), refer to http://ark.intel.com
(Apologies for Andrew's poor voice)

2018-01-29T05:00:00Z

1x189 Inside Show

1x189 Inside Show

  • 2018-01-29T05:00:00Z45m

Announcing the Inside Show, the show that takes you inside Windows!
Inside covers Windows Features, Windows Internals, Exception Codes, Bugcheck Codes and Debugger Commands. Each episode is just 5 minutes, with no specific order between episodes. Watch the Welcome video!
For longer topics (15-30min), we'll continue to cover them on Defrag Tools in 1 or more parts.
Email questions, comments and requests to [email protected] and [email protected]

2018-03-26T04:00:00Z

1x190 Performance Power Slider

1x190 Performance Power Slider

  • 2018-03-26T04:00:00Z45m

In this episode of Defrag Tools, Chad Beeder is joined by Jorge Novillo and Ojasvi Choudhary to discuss the Performance Power Slider in Windows 10. We discuss how it works, how hardware partners can customize it, and how users can adjust some of its settings.

2018-04-23T04:00:00Z

1x191 HRESULT Error Codes

1x191 HRESULT Error Codes

  • 2018-04-23T04:00:00Z45m

In this episode of Defrag Tools, we talk about HRESULT based Error Codes. The 32bits in the HRESULT have meanings, allowing the reader to gain additional insights into the error.

1x192 Windows Update and Windows Upgrade

  • 2018-06-25T04:00:00Z45m

In this episode of Defrag Tools, we talk about Windows Update and Windows Setup. We describe the different technologies, what each does to download the software, prepare the installation, and finish the installation.
In the next episode, we'll dive deep into the logs, showing you how to troubleshoot an installation issue.

2018-07-02T04:00:00Z

1x193 Windows Upgrade Logs

1x193 Windows Upgrade Logs

  • 2018-07-02T04:00:00Z45m

In this episode of Defrag Tools, we talk about the Windows Upgrade Log files.
The "Panther" logs track the installation of a Windows Upgrade. The logs contain Information, Warnings and Errors. Not all errors are fatal, the trick is to look at only the (last) fatal error if an upgrade fails.
The logs pre/post upgrade can be found in:
\$Windows.~bt\sources\panther
\$Windows.~bt\Sources\Rollback
\Windows\Panther
\Windows\Panther\NewOS
You can review the logs manually, or use SetupDiag.

In this episode of Defrag Tools, we continue talking about the Windows Upgrade Log files.
We delve into the Application and Device Inventory Files, that describe application compatibility issues between OS Releases.
The logs pre/post upgrade can be found in:
\$Windows.~bt\sources\panther
\$Windows.~bt\Sources\Rollback
\Windows\Panther
\Windows\Panther\NewOS
You can review the logs manually, or use SetupDiag.

1x195 Console Command Favorites

  • 2018-08-06T04:00:00Z45m

In this episode of Defrag Tools, we geek out on our favorite Command Prompt commands.
Command covered:
where.exe - Where
Shows where a executable/script is on the PATH environment variable
where notepad.exe
ipconfig.exe - IP Configuration
IP Address Configuration - Basic
ipconfig
IP Address Configuration - Advanced/All
ipconfig /all
IP Address Renewal/Reset
ipconfig /flushdns
ipconfig /release
ipconfig /renew
ipconfig /registerdns
findstr.exe - Find String
/s - Sub Directories
/n - Line Number
/p - Search Pattern. e.g. Foo*Bar to match: Footastic Barcode
/c - Escaped characters. e.g. /c:"\"Foo\" Bar" to find the text: "Foo" Bar

1x196 Windows Defender Application Guard

  • 2018-08-20T04:00:00Z45m

In this episode of Defrag Tools, we discuss Windows Defender Application Guard, a great security feature in the Edge browser which allows you to easily run browser sessions in a virtual machine.

2018-10-01T04:00:00Z

1x197 Windows Defender ATP

1x197 Windows Defender ATP

  • 2018-10-01T04:00:00Z45m

In this episode of Defrag Tools, Chris Jackson, the "App Compat Guy" (@appcompatguy), joins us to discuss Windows Defender Advanced Threat Protection (ATP) - a unified platform for preventative protection, post-breach detection, automated investigation, and response.
Defender ATP can be used to automatically investigate alerts and remediate complex threats in minutes.
We delve into the Windows Defender Security Center, and perform Kusto queries to discover security events for the associated enterprise.

2018-10-08T04:00:00Z

1x198 AaronLocker

1x198 AaronLocker

  • 2018-10-08T04:00:00Z45m

In this episode of Defrag Tools, Aaron Margosis joins us to discuss AaronLocker - a set of scripts that help you configure AppLocker. AppLocker restricts application execution, auditing or protecting your system from unwanted/malicious software.
We delve into the abilities of AppLocker, what the AaronLocker scripts automate, and see what it looks like when an application is blocked..

2018-10-29T04:00:00Z

1x199 Desktop App Assure

1x199 Desktop App Assure

  • 2018-10-29T04:00:00Z45m

Beschreibung
In this episode of Defrag Tools, Chris Jackson, the "App Compat Guy" (@appcompatguy), joins us to discuss Windows Desktop App Assure - a program for eligible customers and partners to access FastTrack Specialists who provide advisory and remediation guidance on deploying Windows 10 and Office 365 ProPlus - notably Application Compatibility.

We delve into some examples that the program has diagnosed and show some of the tools the specialists (and yourselves) can use to determine the root cause.

2019-02-11T05:00:00Z

1x200 Game Show Part 1

1x200 Game Show Part 1

  • 2019-02-11T05:00:00Z45m

To celebrate the 200th episode of Defrag Tools, three Microsoft Legends join us in the Channel 9 Studios, with a live studio audience, for a Game Show!

Questions range from campus trivia, all the way through to obscure command switches.

Raymond Chen, KC Lemson and Larry Osterman have all been at Microsoft for decades and have many stories to tell... so many that we needed two parts. So you don't have to wait, both parts are available for binging straight away!

2019-02-11T05:00:00Z

1x201 Game Show Part 2

1x201 Game Show Part 2

  • 2019-02-11T05:00:00Z45m

1x202 InfoSec with Paula Januszkiewicz

  • 2019-03-18T04:00:00Z45m

In this episode of Defrag Tools, Paula Januszkiewicz from CQURE, joins us to discuss Information Security (InfoSec).
We talk about what InfoSec is, how to get started, what the role entails, and how the profession is evolving.
Twitter: @PaulaCqure

Loading...