Archive | December, 2009

Microsoft Leaves Users Waiting For Black Screen Of Death Fix

Keep on Guard!

The news this week has been a flaw in Microsoft‘s all versions of Windows labeled as the “Black Screen of Death”, they did acknowledge the problem a few days ago (in a roundabout way) but basically said it wasn’t their fault and it wasn’t widespread.

The blame is currently being passed around and as of now, no-one really knows exactly what is going on. With Prevx leading up the initial claims that the newest batch of November updates pushed out by Microsoft caused the problem.

Users who want the best Windows experience will need some help from Microsoft. But if the Black Screen of Death case is any indication, Microsoft isn’t so quick to take responsibility. As usual, users find they are left to their own devices to solve problems with software and hardware they paid good money for.

For too long, users have been forced by default to deal with the many security problems that plague the Windows ecosystem. Whether because of malware, flaws in how Microsoft built Windows or any other number of things that can occur in the course of using a Windows PC, it seems that users have to look to their own knowledge and resources to maintain at least a basic level of security.

It has gotten so bad that today, no anti-malware program is capable of targeting and removing every malicious file that can potentially impact a Windows installation. Even with several anti-malware tools installed, not a single Windows user is absolutely safe. And in order to come closer to achieving that lofty goal, the user needs to be diligent, always keeping in mind that if trouble strikes, it could very well be a battle with a malicious hacker.

It’s a pretty crippling bug and very confusing for most users as it’s not a total kernel panic like the traditional Blue Screen of Death but starts up normally and allows you login.

The problem appears after you login when the entire screen is black, there is no menu, no system tray, no taskbar and only a single “My Computer” desktop icon.

Plus any non-technical users trying to remedy the problem will face a tough time, not all fixes work and it’s really an odd problem.

Perhaps that’s why the controversy over the Black Screen of Death has taken on such a life of its own in the past 24 hours. Just one day ago, Windows users experiencing a Black Screen of Death generally believed that the problem began with updates from Microsoft that they had installed.

But after investigating the situation, Microsoft responded late Dec. 1 saying it wasn’t at fault. And Prevx, the security company that initially suggested that Windows updates were to blame, has already backtracked. Once again users are left wondering what they can possibly do to keep from loosing time, data and even possibly cash to this glitch for which Microsoft apparently doesn’t want to take responsibility.

A lot of buck passing has been going on as per usual and the baggage ends up with the end user as per usual with issues pertaining to Microsoft.

It’s pretty heated at the moment so it’ll be interested to see what transpires over the next few days and if we will actually get some definitive answers (unlikely).

Wherever the fault actually lies, Windows 7 users are still left wondering what is going on and how they are supposed to fix it.

Source: eWeek

Posted in: Exploits/Vulnerabilities, Windows Hacking

Tags: , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Windows Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- WannaCry Ransomware Foiled By Domain Killswitch
- Intel Finally Patches Critical AMT Bug (Kinda)
- Shadow Brokers Release Dangerous NSA Hacking Tools

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 238,059 views
- AJAX: Is your application secure enough? - 120,644 views
- eEye Launches 0-Day Exploit Tracker - 86,214 views

Process Hacker v1.7 Released – Process Viewer & Memory Editor

Outsmart Malicious Hackers

Process Hacker is a free and open source process viewer and memory editor with unique features such as powerful process termination and a Regex memory searcher. It can show services, processes and their threads, modules, handles and memory regions.

Key Features

  • Viewing, terminating, suspending and resuming processes.
  • Restarting processes, creating dump files, detaching from any debuggers, viewing heaps, injecting DLLs, etc.
  • Viewing detailed process information, statistics, and performance information.
  • Viewing, terminating, suspending and resuming threads.
  • Viewing detailed token information (including modifying privileges).
  • Viewing and unloading modules.
  • Viewing memory regions.
  • Viewing environment variables.
  • Viewing and closing handles.
  • Viewing, controlling and editing services.
  • Viewing and closing network connections.

System Requirements

  • .NET Framework 2.0
  • Microsoft Windows XP SP2 or above, 32-bit or 64-bit.

You can download Process Hacker v1.7 here:


Or read more here.

Posted in: Forensics, Windows Hacking

Tags: , , , , , , , , ,

Posted in: Forensics, Windows Hacking | Add a Comment
Recent in Forensics:
- PowerShellArsenal – PowerShell For Reverse Engineering
- Androguard – Reverse Engineering & Malware Analysis For Android
- Volatility Framework – Advanced Memory Forensics Framework

Related Posts:

Most Read in Forensics:
- NetworkMiner – Passive Sniffer & Packet Analysis Tool for Windows - 66,794 views
- raw2vmdk – Mount Raw Hard Disk (dd) Images As VMDK Virtual Disks - 35,548 views
- OpenDLP – Free & Open-Source Data Loss Prevention (DLP) Tool - 34,310 views