Skip to content

Commit 83e6210

Browse files
committed
update links to https
1 parent f556640 commit 83e6210

27 files changed

+104
-108
lines changed

ThirdPartyNotices

+1-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ see the [LICENSE](LICENSE) file, and grant you a license to any code in the repo
77
Microsoft, Windows, Microsoft Azure and/or other Microsoft products and services referenced in the documentation
88
may be either trademarks or registered trademarks of Microsoft in the United States and/or other countries.
99
The licenses for this project do not grant you rights to use any Microsoft names, logos, or trademarks.
10-
Microsoft's general trademark guidelines can be found at http://go.microsoft.com/fwlink/?LinkID=254653.
10+
Microsoft's general trademark guidelines can be found at https://go.microsoft.com/fwlink/?LinkID=254653.
1111

1212
Privacy information can be found at https://privacy.microsoft.com/
1313

sysinternals/downloads/adrestore.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ This MS KB article describes the use of AdRestore:
2626

2727
[840001: How to restore deleted user accounts and their group
2828
memberships in Active
29-
Directory](http://support.microsoft.com/?kbid=840001)
29+
Directory](https://support.microsoft.com/?kbid=840001)
3030

3131

3232
[![Download](/media/landing/sysinternals/download_sm.png)](https://download.sysinternals.com/files/ADRestore.zip)  [**Download AdRestore**](https://download.sysinternals.com/files/ADRestore.zip) **(42 KB)**

sysinternals/downloads/bginfo.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -42,10 +42,10 @@ other applications.
4242
## Installation and Use
4343

4444
See Mark's *Windows IT Pro Magazine* [Power Tools
45-
article](http://windowsitpro.com/systems-management/bginfo) for a primer
45+
article](https://windowsitpro.com/systems-management/bginfo) for a primer
4646
on using *BgInfo*. If you have questions or problems, please visit the
4747
[Sysinternals BgInfo
48-
Forum](http://forum.sysinternals.com/forum_topics.asp?fid=5).
48+
Forum](https://forum.sysinternals.com/forum_topics.asp?fid=5).
4949

5050
By placing *BGInfo* in your **Startup** folder, you can ensure that the
5151
system information being displayed is up to date each time you boot.

sysinternals/downloads/bluescreen.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ activity, which adds an extra touch of realism!
5858

5959
You can find out how real Blue Screens are generated, and what the
6060
information on the Blue Screen means in my December 1997 [*Windows ITPro
61-
Magazine*](http://www.windowsitpro.com/) NT Internals column, *"Inside
61+
Magazine*](https://www.windowsitpro.com/) NT Internals column, *"Inside
6262
the Blue Screen."*
6363

6464
**Note: Some virus scanners flag the Bluescreen screen saver as a virus.

sysinternals/downloads/cpustres.md

+1-5
Original file line numberDiff line numberDiff line change
@@ -40,13 +40,9 @@ Each thread can be started, paused or stopped independently and can be configure
4040

4141
- [**Windows Internals Book**](~/learn/windows-internals.md) The official updates and errata page for the definitive book on
4242
Windows internals, by Mark Russinovich and David Solomon.
43-
- [**Pavel's Blog**](http://blogs.microsoft.co.il/pavely/2016/06/11/enhanced-cpu-stress-tool/) Pavel Yosifovich's blog describing the tool
43+
- [**Pavel's Blog**](https://blogs.microsoft.co.il/pavely/2016/06/11/enhanced-cpu-stress-tool/) Pavel Yosifovich's blog describing the tool
4444

4545
## Download
4646

4747
[![Download](/media/landing/sysinternals/download_sm.png)](https://download.sysinternals.com/files/CPUSTRES.zip)[**Download Cpustres**](https://download.sysinternals.com/files/CPUSTRES.zip) **(10 KB)**
4848
**Run now** from [Sysinternals Live](https://live.sysinternals.com/cpustres.exe).
49-
50-
51-
52-

sysinternals/downloads/handle.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -83,9 +83,9 @@ The following Microsoft KB articles reference Handle for diagnosing or
8383
troubleshooting various problems:
8484

8585
- [245068: Err Msg: Access is Denied. You Don't Have Permissions or
86-
the File is in Use](http://support.microsoft.com/kb/245068)
86+
the File is in Use](https://support.microsoft.com/kb/245068)
8787
- [276525: Your Computer May Stop Responding When You Monitor Open
88-
Handles](http://support.microsoft.com/kb/276525)
88+
Handles](https://support.microsoft.com/kb/276525)
8989

9090

9191
[![Download](/media/landing/sysinternals/download_sm.png)](https://download.sysinternals.com/files/Handle.zip) [**Download Handle**](https://download.sysinternals.com/files/Handle.zip) **(701 KB)**

sysinternals/downloads/junction.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ mechanism on which NTFS junctions are based, and they are used by
3535
Windows' Remote Storage Service (RSS), as well as volume mount points.
3636

3737
Please read this [Microsoft KB
38-
article](http://support.microsoft.com/?kbid=205524) for tips on using
38+
article](https://support.microsoft.com/?kbid=205524) for tips on using
3939
junctions.
4040

4141
> Windows does not support junctions to directories on remote shares.

sysinternals/downloads/livekd.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Published: May 16, 2017
2323
2000, 3rd Edition*, is now freely available. *LiveKD* allows you to run
2424
the Kd and Windbg Microsoft kernel debuggers, which are part of the
2525
[Debugging Tools for Windows
26-
package](http://www.microsoft.com/whdc/devtools/debugging/default.mspx),
26+
package](https://www.microsoft.com/whdc/devtools/debugging/default.mspx),
2727
locally on a live system. Execute all the debugger commands that work on
2828
crash dump files to look deep inside the system. See the Debugging Tools
2929
for Windows documentation and our book for information on how to explore
@@ -41,7 +41,7 @@ own live kernel debugging facility.
4141
First download and install the Debugging Tools for Windows package from
4242
Microsoft's web site:
4343

44-
[http://msdn.microsoft.com/library/windows/hardware/ff551063(v=vs.85).aspx](http://msdn.microsoft.com/library/windows/hardware/ff551063(v=vs.85).aspx)
44+
[https://msdn.microsoft.com/library/windows/hardware/ff551063(v=vs.85).aspx](https://msdn.microsoft.com/library/windows/hardware/ff551063(v=vs.85).aspx)
4545

4646
If you install the tools to their default directory of \\Program
4747
Files\\Microsoft\\Debugging Tools for Windows, you can run *LiveKD* from

sysinternals/downloads/newsid.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Published: November 1, 2006
1919
**Note:** NewSID has been retired and is no longer available for
2020
download. Please see Mark Russinovich’s blog post: [NewSID Retirement
2121
and the Machine SID Duplication
22-
Myth](http://blogs.technet.com/markrussinovich/archive/2009/11/03/3291024.aspx)
22+
Myth](https://blogs.technet.com/markrussinovich/archive/2009/11/03/3291024.aspx)
2323

2424
## IMPORTANT:
2525

@@ -32,7 +32,7 @@ following Knowledge Base article:
3232

3333
- [<strong>The Microsoft policy concerning disk duplication of Windows XP
3434
installations</strong>
35-
](http://support.microsoft.com/default.aspx?scid=kb;en-us;314828)
35+
](https://support.microsoft.com/default.aspx?scid=kb;en-us;314828)
3636

3737

3838
## Introduction
@@ -95,9 +95,9 @@ the technique of disk cloning. A system administrator installs the base
9595
operating system and add-on software used in the company on a template
9696
computer. After configuring the machine for operation in the company
9797
network, automated disk or system duplication tools (such as
98-
[Symantec's](http://www.symantec.com/)*Ghost*,
99-
[PowerQuest's](http://www.powerquest.com/)*Image Drive*, and
100-
[Altiris'](http://www.altiris.com/)*RapiDeploy*) are used to copy the
98+
[Symantec's](https://www.symantec.com/)*Ghost*,
99+
[PowerQuest's](https://www.powerquest.com/)*Image Drive*, and
100+
[Altiris'](https://www.altiris.com/)*RapiDeploy*) are used to copy the
101101
template computer's drives onto tens or hundreds of computers. These
102102
clones are then given final tweaks, such as the assignment of unique
103103
names, and then used by company employees.

sysinternals/downloads/portmon.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ The on-line help-file describes all these features, and more, in detail.
5959
Simply execute the *Portmon* program file (portmon.exe) and *Portmon*
6060
will immediately start capturing debug output. To run *Portmon* on
6161
Windows 95 you must get the [WinSock2
62-
update](http://support.microsoft.com/kb/177719) from Microsoft. Note
62+
update](https://support.microsoft.com/kb/177719) from Microsoft. Note
6363
that if you run *Portmon* on Windows NT/2K portmon.exe must be located
6464
on a non-network drive and you must have administrative privilege.
6565
Menus, hot-keys, or toolbar buttons can be used to clear the window,

sysinternals/downloads/procdump.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -211,14 +211,14 @@ See a list of example command lines (the examples are listed above):
211211
## Learn More
212212

213213
- [Defrag Tools: \#9 -
214-
ProcDump](http://channel9.msdn.com/shows/defrag-tools/defrag-tools-9-procdump)
214+
ProcDump](https://channel9.msdn.com/shows/defrag-tools/defrag-tools-9-procdump)
215215
This episode of Defrag Tools covers what the tool captures and
216216
expected outage durations
217217
- [Defrag Tools: \#10 - ProcDump -
218-
Triggers](http://channel9.msdn.com/shows/defrag-tools/defrag-tools-10-procdump-triggers)
218+
Triggers](https://channel9.msdn.com/shows/defrag-tools/defrag-tools-10-procdump-triggers)
219219
This episode covers trigger options in particular 1st & 2nd chance
220220
exceptions
221221
- [Defrag Tools: \#11 - ProcDump - Windows 8 & Process
222-
Monitor](http://channel9.msdn.com/shows/defrag-tools/defrag-tools-11-procdump-windows-8--process-monitor)
222+
Monitor](https://channel9.msdn.com/shows/defrag-tools/defrag-tools-11-procdump-windows-8--process-monitor)
223223
This episode covers modern application support and Process Monitor
224224
logging support

sysinternals/downloads/process-explorer.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ available at Sysinternals:
9191
- [PsKill](pskill.md) -
9292
local/remote command-line process killer
9393
- [Defrag Tools: \#2 - Process
94-
Explorer](http://channel9.msdn.com/shows/defrag-tools/defrag-tools-2-process-explorer)
94+
Explorer](https://channel9.msdn.com/shows/defrag-tools/defrag-tools-2-process-explorer)
9595
In this episode of Defrag Tools, Andrew Richards and Larry Larsen
9696
show how to use Process Explorer to view the details of processes,
9797
both at a point in time and historically.

sysinternals/downloads/pskill.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ command-line options defined below.
3535
## Using PsKill
3636

3737
See the September 2004 issue of Windows IT Pro Magazine for [Mark's
38-
article](http://windowsitpro.com/search/results/mark%27s%20article?filters=ss_type:article)
38+
article](https://windowsitpro.com/search/results/mark%27s%20article?filters=ss_type:article)
3939
that covers advanced usage of *PsKill*.
4040

4141
Running *PsKill* with a process ID directs it to kill the process of
@@ -61,7 +61,7 @@ This Microsoft KB article references *PsKill*:
6161

6262
[810596: PSVR2002: "There Is No Information to Display in This View"
6363
Error Message When You Try to Access a Project
64-
View](http://support.microsoft.com/kb/810596)
64+
View](https://support.microsoft.com/kb/810596)
6565

6666

6767
[![Download](/media/landing/sysinternals/download_sm.png)](https://download.sysinternals.com/files/PSTools.zip) [**Download PsTools**](https://download.sysinternals.com/files/PSTools.zip) **(2.7 MB)**

sysinternals/downloads/psshutdown.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ with command-line options defined below.
3838
## Using PsShutdown
3939

4040
See the February 2005 issue of Windows IT Pro Magazine for [Mark's
41-
article](http://www.windowsitpro.com/article/articleid/44973/44973.html)
41+
article](https://www.windowsitpro.com/article/articleid/44973/44973.html)
4242
that covers advanced usage of *PsKill*.
4343

4444
You can use *PsShutdown* to initiate a shutdown of the local or a remote

sysinternals/downloads/pstools.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ usage information for all the tools.
7979

8080
### Installation
8181
None of the tools requires any special installation. You don't even need to install any client software on the remote computers at which you target them. Run them by typing their name and any command-line options you want. To show complete usage information, specify the "-? " command-line option.
82-
If you have questions or problems, please visit the [Sysinternals PsTools Forum](http://forum.sysinternals.com/forum_topics.asp?FID=8).
82+
If you have questions or problems, please visit the [Sysinternals PsTools Forum](https://forum.sysinternals.com/forum_topics.asp?FID=8).
8383

8484
### Related Links
8585
[Introduction to the PsTools](https://technet.microsoft.com/library/2007.03.desktopfiles.aspx): Wes Miller gives a high-level overview of the Sysinternals PsTools in the March column of his TechNet Magazine column.

sysinternals/downloads/rammap.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ Edition](~/learn/windows-internals.md).
7070

7171
## Learn More
7272

73-
- [Defrag Tools: \#6 - RAMMap](http://channel9.msdn.com/shows/defrag-tools/defrag-tools-6-rammap)
73+
- [Defrag Tools: \#6 - RAMMap](https://channel9.msdn.com/shows/defrag-tools/defrag-tools-6-rammap)
7474
In this episode of Defrag Tools, Andrew Richards and Larry Larsen
7575
cover using RAMMap to see how RAM is being used and tell if there
7676
has been any memory pressure.

sysinternals/downloads/rootkit-revealer.md

+7-7
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ For best results exit all applications and keep the system otherwise
138138
idle during the RootkitRevealer scanning process.
139139

140140
If you have questions or problems please visit the [Sysinternals
141-
RootkitRevealer Forum](http://forum.sysinternals.com).
141+
RootkitRevealer Forum](https://forum.sysinternals.com).
142142

143143
## Manual Scanning
144144

@@ -304,30 +304,30 @@ The following Web sites and books are sources of more information on
304304
rootkits:
305305

306306
[Sony, Rootkits and Digital Rights Management Gone Too
307-
Far](http://blogs.technet.com/markrussinovich)
307+
Far](https://blogs.technet.com/markrussinovich)
308308
Read Mark's blog entry on his discovery and analysis of a Sony rootkit
309309
on one of his computers.
310310

311-
[Unearthing Rootkits](http://windowsitpro.com/windows)
311+
[Unearthing Rootkits](https://windowsitpro.com/windows)
312312
Mark's June *Windows IT Pro Magazine* article provides an overview of
313313
rootkit technologies and how RootkitRevealer works.
314314

315315
[Rootkits: Subverting the Windows
316-
Kernel](http://www.amazon.com/rootkits-subverting-windows-greg-hoglund/dp/0321294319/sr=8-1/qid=1162397366/ref=pd_bbs_sr_1/103-0553948-5716666?ie=utf8&s=books)
316+
Kernel](https://www.amazon.com/rootkits-subverting-windows-greg-hoglund/dp/0321294319/sr=8-1/qid=1162397366/ref=pd_bbs_sr_1/103-0553948-5716666?ie=utf8&s=books)
317317
This book by Greg Hoglund and Jamie Butler is the most comprehensive
318318
treatment of rootkits available.
319319

320-
[www.phrack.org](http://www.phrack.org/)
320+
[www.phrack.org](https://www.phrack.org/)
321321
This site stores the archive of *Phrack*, a cracker-oriented magazine
322322
where developers discuss flaws in security-related products, rootkit
323323
techniques, and other malware tricks.
324324

325325
[The Art of Computer Virus Research and
326-
Defense](http://www.amazon.com/art-computer-virus-research-defense/dp/0321304543/sr=8-1/qid=1162397489/ref=pd_bbs_sr_1/103-0553948-5716666?ie=utf8&s=books),
326+
Defense](https://www.amazon.com/art-computer-virus-research-defense/dp/0321304543/sr=8-1/qid=1162397489/ref=pd_bbs_sr_1/103-0553948-5716666?ie=utf8&s=books),
327327
by Peter Szor
328328

329329
[Malware: Fighting Malicious
330-
Code](http://www.amazon.com/malware-fighting-malicious-ed-skoudis/dp/0131014056/sr=1-2/qid=1162397556/ref=pd_bbs_sr_2/103-0553948-5716666?ie=utf8&s=books),
330+
Code](https://www.amazon.com/malware-fighting-malicious-ed-skoudis/dp/0131014056/sr=1-2/qid=1162397556/ref=pd_bbs_sr_2/103-0553948-5716666?ie=utf8&s=books),
331331
by Ed Skoudis and Lenny Zeltser
332332

333333
*Windows Internals, 4th Edition*, by Mark Russinovich and Dave Solomon

sysinternals/downloads/shellrunas.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -57,4 +57,4 @@ shellrunas \[/netonly\] &lt;*program*&gt; \[*arguments*\]**
5757

5858
## Getting Help
5959

60-
If you have problems or questions, please visit the [Sysinternals Forum](http://forum.sysinternals.com).
60+
If you have problems or questions, please visit the [Sysinternals Forum](https://forum.sysinternals.com).

sysinternals/downloads/sysmon.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,9 @@ reboots to monitor and log system activity to the Windows event log. It
2424
provides detailed information about process creations, network
2525
connections, and changes to file creation time. By collecting the events
2626
it generates using [Windows Event
27-
Collection](http://msdn.microsoft.com/library/windows/desktop/bb427443(v=vs.85).aspx)
27+
Collection](https://msdn.microsoft.com/library/windows/desktop/bb427443(v=vs.85).aspx)
2828
or
29-
[SIEM](http://en.wikipedia.org/wiki/security_information_and_event_management)
29+
[SIEM](https://en.wikipedia.org/wiki/security_information_and_event_management)
3030
agents and subsequently analyzing them, you can identify malicious or
3131
anomalous activity and understand how intruders and malware operate on
3232
your network.

sysinternals/downloads/tcpview.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ utility:
7676
This Microsoft KB article references TCPView:
7777

7878
[816944: "Unexpected Error 0x8ffe2740 Occurred" Error Message When You
79-
Try to Start a Web Site](http://support.microsoft.com/kb/816944)
79+
Try to Start a Web Site](https://support.microsoft.com/kb/816944)
8080

8181
[![Download](/media/landing/sysinternals/download_sm.png)](https://download.sysinternals.com/files/TCPView.zip) [**Download TCPView**](https://download.sysinternals.com/files/TCPView.zip) **(285 KB)**
8282

sysinternals/downloads/vmmap.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -65,14 +65,14 @@ optimize their application's memory resource usage.
6565
## Getting Help
6666

6767
If you have problems or questions, please visit the [Sysinternals
68-
Forum](http://forum.sysinternals.com).
68+
Forum](https://forum.sysinternals.com).
6969

7070

7171

7272
## Learn More
7373

7474
- [Defrag Tools: \#7 -
75-
VMMap](http://channel9.msdn.com/shows/defrag-tools/defrag-tools-7-vmmap)
75+
VMMap](https://channel9.msdn.com/shows/defrag-tools/defrag-tools-7-vmmap)
7676
In this episode of Defrag Tools, Andrew Richards and Larry Larsen
7777
cover how to use VMMap to see how Virtual Memory is being used and
7878
if there have been any memory leaks.

sysinternals/downloads/winobj.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ objects located there, but the interfaces are undocumented.
5959

6060
Helen Custer's *Inside Windows NT* provides a good overview of the
6161
Object Manager name space, and Mark's October 1997 [WindowsITPro
62-
Magazine](http://www.windowsitpro.com/) column, "Inside the Object
62+
Magazine](https://www.windowsitpro.com/) column, "Inside the Object
6363
Manager", is (of course) an excellent overview.
6464

6565
[![Download](/media/landing/sysinternals/download_sm.png)](https://download.sysinternals.com/files/WinObj.zip) [**Download WinObj**](https://download.sysinternals.com/files/WinObj.zip) **(447 KB)**

0 commit comments

Comments
 (0)