Mark Russinovich

Bellevue, Washington, United States Contact Info
122K followers 500+ connections

Join to view profile

Activity

Join now to see all activity

Experience & Education

  • Carnegie Mellon University

View Mark’s full experience

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Publications

  • Trojan Horse

    Thomas Dunne Books

    It’s two years post-Zero Day, and former government analyst Jeff Aiken is reaping the rewards for crippling al-Qaida’s attack on the computer infrastructure of the Western world. His cyber – security company is flourishing, and his relationship with Daryl Haugen intensifies when she becomes a part of his team.

    But the West is under the East’s greatest threat yet. The Stuxnet virus that successfully subverted Iran’s nuclear defense program for years is being rapidly identified and…

    It’s two years post-Zero Day, and former government analyst Jeff Aiken is reaping the rewards for crippling al-Qaida’s attack on the computer infrastructure of the Western world. His cyber – security company is flourishing, and his relationship with Daryl Haugen intensifies when she becomes a part of his team.

    But the West is under the East’s greatest threat yet. The Stuxnet virus that successfully subverted Iran’s nuclear defense program for years is being rapidly identified and defeated, and Stuxnet’s creators are stressed to develop a successor. As Jeff and Daryl struggle to stay together, they’re summoned to disarm the attack of a revolutionary, invisible trojan that alters data without leaving a trace. As the trojan penetrates Western intelligence, the terrifying truth about Iran is revealed, and Jeff and Daryl find themselves running a desperate race against time to reverse it – while the fate of both East and West hangs in the balance.

    Like Zero Day, Trojan Horse is a thrilling suspense story, a sober warning from one of the world’s leading experts on cyber-security, Microsoft Technical Fellow Mark Russinovich. Trojan Horse exposes the already widespread use of international cyber-espionage as a powerful and dangerous weapon, and the lengths to which one man will go to stop it.

    See publication
  • Sysinternals Administrators Reference

    Microsoft Press

    The Windows Sysinternals Administrator’s Reference is the official book on the Sysinternals tools, written by tool author and Sysinternals cofounder Mark Russinovich, and Windows expert Aaron Margosis. The book covers all 70+ tools in detail, with full chapters on the major tools like Process Explorer and Autoruns. In addition to tips and tricks in the tool chapters, it includes 17 “Case of the Unexplained…” examples of the tools used by users to solve real-world problems. Buy the book today…

    The Windows Sysinternals Administrator’s Reference is the official book on the Sysinternals tools, written by tool author and Sysinternals cofounder Mark Russinovich, and Windows expert Aaron Margosis. The book covers all 70+ tools in detail, with full chapters on the major tools like Process Explorer and Autoruns. In addition to tips and tricks in the tool chapters, it includes 17 “Case of the Unexplained…” examples of the tools used by users to solve real-world problems. Buy the book today and take your Windows troubleshooting and systems management skills to the next level.

    Other authors
    • Aaron Margosis
    See publication
  • Zero Day

    Thomas Dunne Books

    An airliner’s controls abruptly fail mid-flight over the Atlantic. An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction.

    At first, these random computer failures seem like unrelated events. But Jeff Aiken, a…

    An airliner’s controls abruptly fail mid-flight over the Atlantic. An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction.

    At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led up to 9/11, thinks otherwise. Jeff fears a more serious attack targeting the United States computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn’t much time if he hopes to prevent an international catastrophe.

    Written by a global authority on cyber security, Zero Day presents a chilling “what if” scenario that, in a world completely reliant on technology, is more than possible today---it’s a cataclysmic disaster just waiting to happen.

    See publication
  • Windows Internals, 6th Edition

    Microsoft Press

    Windows Internals, 6th edition covers the internals of the core kernel components of the Windows 7 and Windows Server 2008 R2 operating systems. This classic book will help you:

    Understand how the core system and management mechanisms work—from the object manager to services to the registry
    Explore internal system data structures using tools like the kernel debugger
    Grasp the scheduler’s priority and CPU placement algorithms
    Go inside the Windows security model to see how it…

    Windows Internals, 6th edition covers the internals of the core kernel components of the Windows 7 and Windows Server 2008 R2 operating systems. This classic book will help you:

    Understand how the core system and management mechanisms work—from the object manager to services to the registry
    Explore internal system data structures using tools like the kernel debugger
    Grasp the scheduler’s priority and CPU placement algorithms
    Go inside the Windows security model to see how it authorizes access to data
    Understand how Windows manages physical and virtual memory
    Tour the Windows networking stack from top to bottom—including APIs, protocol drivers, and network adapter drivers
    Troubleshoot file-system access problems and system boot problems
    Learn how to analyze crashes
    Sixth in the series, this edition was again written by Mark Russinovich, a Technical Fellow in Microsoft’s Azure Group, David Solomon, an operating systems expert and Windows internals teacher, and Alex Ionescu, Chief Architect at CrowdStrike and specializing in OS internals and security. Besides updates for changes in Windows, there are many new experiments and examples that highlight the use of both existing and new Sysinternals tools.

    See publication

Recommendations received

More activity by Mark

View Mark’s full profile

  • See who you know in common
  • Get introduced
  • Contact Mark directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Mark Russinovich

Add new skills with these courses