From e3146f6852d060999992937e01a13cbd291a4076 Mon Sep 17 00:00:00 2001 From: "http://nullroute.eu.org/~grawity/" Date: Wed, 13 Nov 2013 06:22:49 +0000 Subject: [PATCH] Added a comment --- .../comment_1_d690a52db82f9594d99ae65fe51e1f1a._comment | 8 ++++++++ 1 file changed, 8 insertions(+) create mode 100644 doc/devblog/day_55__fireside_porting/comment_1_d690a52db82f9594d99ae65fe51e1f1a._comment diff --git a/doc/devblog/day_55__fireside_porting/comment_1_d690a52db82f9594d99ae65fe51e1f1a._comment b/doc/devblog/day_55__fireside_porting/comment_1_d690a52db82f9594d99ae65fe51e1f1a._comment new file mode 100644 index 0000000000..74acc83221 --- /dev/null +++ b/doc/devblog/day_55__fireside_porting/comment_1_d690a52db82f9594d99ae65fe51e1f1a._comment @@ -0,0 +1,8 @@ +[[!comment format=mdwn + username="http://nullroute.eu.org/~grawity/" + nickname="Mantas" + subject="comment 1" + date="2013-11-13T06:22:49Z" + content=""" +[ProcExp](http://technet.microsoft.com/en-us/sysinternals/bb896645.aspx) may be useful -- it can show process-related syscalls and their return codes _(among other things like file or registry access)_ so it should tell exactly why the exec failed. +"""]]