Leveraging the new Time Travel Trace API in Debugging tools to find when one or more SharePoint event happened
In my previous post, I showed a proof-of-concept script to list all occasions a process opened a file. JavaScript is easy to program and works for most cases, however in some occasions you need to access resources not available from JavaScript and only a full-fledged debugging extension will do. In this post I will show
Pure Native C++ consuming .NET classes without COM registration
One of the problems that many C++ native developers face when interacting with .NET is the inability to load a .NET COM Dll and use the COM classes without registering the DLL. I faced this problem when adapting the debugging NetExt from pure C++ to pure C++/.NET. As the idea of an extension is
Console Application to discover Effective Named Pipe Path of a WCF net.pipe Endpoint (Update for .NET 4.0+)
Named pipes created by WCF does not look like the endpoint at all. I discuss this at length here: Named Pipes in WCF are named but not by you (and how to find the actual windows object name) I wrote an console application to test it and I detailed this here: Console Application to
First NetExt custom command added by the community – !wsocket
James Davis is a big shot in the debugging community and maintains a hard core blog of his experiences. Just soon after NetExt came back online he contacted me via the blog with some very particular questions, the kind of question only seasoned debuggers (and debug extension writers) know how to ask. He focused
Hardcore Debugging for .NET Developers (not for the faint of heart)
UPDATE******* NETExt is now back in version 2.0.0.500 using a ClrMD as API. Get it here: http://netext.codeplex.com
Console Application to discover Effective Named Pipe Path of a WCF net.pipe Endpoint
As I have promised in my previous post, I am making available a C++ console application to troubleshoot named pipes endpoints in WCF. Below is a screenshot of the application: Application logic: It gets the endpoint from the command line and substitute the host name by +, * depending on the wildcard mode. It
Some thoughts on Impersonation
I normally talk about SharePoint topics but this post is also important for non-SharePoint people. First let me explain what is the relationship between impersonation and SharePoint, or better, the relationship between SharePoint and the thread [security] token. SPRequest is the unmanaged low level class in SharePoint that works as HtppHandler for SharePoint requests. In