enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Dr. Watson (debugger) - Wikipedia

    en.wikipedia.org/wiki/Dr._Watson_(debugger)

    This Microsoft Windows article is a stub. You can help Wikipedia by expanding it.

  3. Machine-check exception - Wikipedia

    en.wikipedia.org/wiki/Machine-check_exception

    A failing motherboard or processor can be identified by swapping them with functioning parts. Memory can be checked by booting to a diagnostic tool, like memtest86. Non-essential failing I/O devices and controllers can be identified by unplugging them if possible or disabling the devices to see if the problem disappears.

  4. Debug (command) - Wikipedia

    en.wikipedia.org/wiki/Debug_(command)

    The line-oriented debugger DEBUG.EXE is an external command in operating systems such as DOS, OS/2 and Windows (only in 16-bit/32-bit versions [1]).. DEBUG can act as an assembler, disassembler, or hex dump program allowing users to interactively examine memory contents (in assembly language, hexadecimal or ASCII), make changes, and selectively execute COM, EXE and other file types.

  5. Microsoft Diagnostics - Wikipedia

    en.wikipedia.org/wiki/Microsoft_Diagnostics

    Microsoft Diagnostics (MSD) was a software tool developed by Microsoft to assist in the diagnostics of 1990s-era computers. Users primarily deployed this tool to provide detailed technical information about the user's software and hardware and to print the gathered information, usually for use by support technicians in troubleshooting and resolving problems.

  6. HIMEM.SYS - Wikipedia

    en.wikipedia.org/wiki/HIMEM.SYS

    In Windows 3.1 and Windows 9x, there is also a command-line loadable version of HIMEM.SYS called XMSMMGR.EXE. It can load extended memory services after the system boots into the command prompt. It can load extended memory services after the system boots into the command prompt.

  7. ntoskrnl.exe - Wikipedia

    en.wikipedia.org/wiki/Ntoskrnl

    Application programs run in processes and supply code that runs in user mode. The upper part is accessible only from kernel mode, and with some exceptions, is instantiated just once, system-wide. ntoskrnl.exe is mapped into this region, as are several other kernel mode components.

  8. Executable-space protection - Wikipedia

    en.wikipedia.org/wiki/Executable-space_protection

    Executable space protection on Windows is called "Data Execution Prevention" (DEP). Under Windows XP or Server 2003 NX protection was used on critical Windows services exclusively by default. If the x86 processor supported this feature in hardware, then the NX features were turned on automatically in Windows XP/Server 2003 by default. If the ...

  9. ANSI.SYS - Wikipedia

    en.wikipedia.org/wiki/ANSI.SYS

    To use ANSI.SYS under DOS, a line is added to the CONFIG.SYS (or CONFIG.NT under Windows NT based versions of Windows) file that reads: DEVICE=drive:\path\ANSI.SYS options. where drive: and path are the drive letter and path to the directory in which the file ANSI.SYS is found, and options can be a number of optional switches to control the ...