ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unsent IE Error Reports Turn Up in the Most Shocking of Places!

b2ap3_thumbnail_ie_reports_found_400.jpgMicrosoft’s Internet Explorer is one of the most widely used web browsers, despite the fact that it has a tendency to crash from time to time. In order to improve the product and prevent future bugs, glitches, and crashes, IE creates an error report after every crash. Most of these reports go unsent, or so Microsoft thought.

You’ve likely experienced an error report before; they tend to pop up at the worst possible time.

ie error messages

Yep, that’s the window we’re referring to. Try to restrain yourself from flipping over your desk at the sight of it.

You’ll notice that this report gives the user two options, “Send Error Report” or “Don’t Send Error Report.” Even though Microsoft and the future of IE would benefit immensely from sending the error report, it rarely happens. In fact, the number of users who click “Don’t Send” is somewhere in the 90th percentile. This translates to a lot of error reports that are never read, much to the chagrin of Microsoft's software engineers.

Everything is Not What it Seems
Or at least, this is what Microsoft thought regarding the fate of IE’s unsent error reports. It turns out that, for all of these years, clicking “Don’t Send” actually sends them somewhere, and you’re not going to believe where this someplace is.

Microsoft was recently tipped off about this discrepancy when they were designing the new Spartan web browser by looking closely at Internet Explorer’s original code, and that’s when they saw it. Buried deep within Internet Explorer was a small and seemingly-insignificant line of code that automatically sent the error report somewhere. Microsoft put their top team of programmers on the case and it led them to one famous address: 232 Santa Margarita Ave., Menlo Park, California.

google garage

This innocent-looking garage is world renowned for facilitating the humble beginnings of one of today’s largest software companies, Google Inc. Between 1998 and 1999, Google founders Larry Page and Sergey Brin rented the space. During this five-month period, they, along with five other employees, worked tirelessly to “build a better search engine.” Google’s subsequent growth and success is the stuff of Silicon Valley legend, but it turns out that they had the advantage of seeing “unsent” IE error reports.

During this time, few people at Microsoft have even heard of Google, while more than 40 percent of the world’s PC users were rocking and loving Internet Explorer. Meanwhile, boxes and boxes of IE error reports were being piped to the Menlo Park address. It sounds like a crazy conspiracy theory, but a legal team from Microsoft has recently uncovered boxes of these printed reports in the home’s attic.

boxes of reports

The evidence appears to be quite damning against Google and the tech industry promises to never be the same again. The lawyers at Microsoft have already taken action and filed an injunction against Google and its Chrome browser, and a federal judge has ordered Google to cease and desist all operations by April 1st, April Fool’s Day.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Productivity Quick Tips Social Media VoIP Users Mobile Device Automation Tech Term Business Continuity Windows 10 Facebook Disaster Recovery Passwords Holiday Covid-19 Managed Service Apps IT Support Windows 10 Browser Miscellaneous Cloud Computing Outsourced IT Internet of Things Managed Service Provider Remote Work Data Management Government Saving Money Operating System Artificial Intelligence Managed IT services Networking Windows Gadgets Workplace Strategy Server Bandwidth WiFi Blockchain Encryption Mobile Device Management Business Technology App Virtualization Information Remote Spam Budget Gmail Office Apple Two-factor Authentication Information Technology Employee/Employer Relationship History Office 365 Health Access Control Data Security Analytics Cybercrime Wi-Fi BDR Conferencing Big Data Document Management Hacker Save Money Voice over Internet Protocol Patch Management Remote Computing Compliance Remote Monitoring Help Desk Hacking Cost Management IT Management Training Employer-Employee Relationship Vendor Retail Data storage Alert Vulnerabilities Money Customer Service Hiring/Firing Unified Threat Management Firewall Outlook Mobile Office Password Augmented Reality Word Managed Services Project Management BYOD Data loss IBM Website Computing Vendor Management Hard Drive Search... Best Practice Applications Legal Update Windows 11 Monitoring Sports Travel Healthcare Social User SaaS DDoS Virtual Reality Remote Workers Social Engineering Cryptocurrency Paperless Office Antivirus Black Market Windows 7 Free Resource Maintenance iPhone Cleaning Education Cortana Chrome Robot Content Filtering How To Router Websites Mobile Computing Mobility Meetings The Internet of Things Marketing YouTube Running Cable Google Maps Twitter Scam Data Breach Law Enforcement Laptop End of Support Storage Printer VPN Downtime Tech Terms Video Conferencing Hack Safety Identity Theft Virtual Machines Notifications Managed IT Digital Unified Communications Computer Repair Multi-factor Authentication Virtual Desktop Google Docs HIPAA Professional Services Experience Bluetooth Taxes Distributed Denial of Service Office Tips Saving Time Private Cloud Memory Managed Services Provider Disaster Computers Bitcoin Physical Security Virtual Private Network Telephone Politics Current Events Machine Learning Settings Lithium-ion battery Start Menu PowerPoint Excel Solutions Solid State Drive Downloads Administration Computer Care Processors Vulnerability Images 101 Presentation Integration Display Specifications IT Consultant Drones Chromebook Software as a Service Data Protection Virtual Assistant Automobile Employees Customer Relationship Management Co-Managed IT Avoiding Downtime How To Entertainment Holidays Wireless Technology Microchip Flexibility Processor eWaste Cooperation email scam Teamwork Reliable Computing Heating/Cooling Writing Tablet Navigation 2FA Environment G Suite Addiction Data Storage Mobile Security Hypervisor Windows XP Mouse VoIP Social Networking Tracking User Tip Shopping Legislation News Medical IT SQL Server Scalability Evernote Paperless Troubleshooting Web Server Network Management PCI DSS Licensing Administrator SharePoint Text Messaging Proactive IT Digital Payment Worker Proxy Server Gig Economy Emails Humor Fake News Supply Chain Bring Your Own Device Computing Infrastructure Azure Access Business Communications Service Level Agreement Internet Service Provider Management Regulations Compliance Device security Managed IT Service Time Management Music Public Cloud Wireless Headphones Memes Microsoft Excel Workplace Staffing Business Cards Audit IP Address Spyware Tech Human Resources Business Owner Going Green Net Neutrality Error Financial Data Botnet File Sharing Rental Service Redundancy Micrsooft Bookmark Risk Management IT Scams Piracy Flash Cache Term Google Apps Download Business Growth Workers Telework HTML Telephone Systems Unified Threat Management Recovery Competition Browsers Smartwatch Nanotechnology Communitications Microsoft 365 Cables Software License Printing Google Play Inbound Marketing CCTV Upload Procurement Entrepreneur Google Wallet Social Network FinTech LiFi Banking Touchscreen Documents Messenger Emergency Application Deep Learning Data Analysis CES Computer Malfunction Screen Reader IT Assessment Point of Sale Mobile Technology Value Vendor Mangement Security Cameras Business Intelligence Trends Supply Chain Management Electronic Payment Hosted Solution Samsung Customer Resource management Organization Devices Cyber security Shortcuts Business Metrics Securty Books Uninterrupted Power Supply Fileless Malware Webcam Smart Devices Tip of the week Company Culture Domains Language Business Mangement Society Gamification Remote Working Tablets Telephone System AI Phone System Regulations Trend Micro Be Proactive Reading Monitors Directions Digital Security Cameras Visible Light Communication Backup and Disaster Recovery Electronic Health Records Transportation Desktop Wasting Time Google Calendar Windows 8 Supercomputer Content Electronic Medical Records Accountants eCommerce Modem Workplace Strategies Virus Relocation Public Speaking Displays Videos Advertising Motion Sickness Database Surveillance Computer Accessories Managing Costs Streaming Media Comparison Work/Life Balance Google Drive Tech Support Keyboard Health IT Equifax SSID Hard Drive Disposal Employer/Employee Relationships Knowledge Hard Drives Corporate Profile Media Tactics Development Username Virtual Machine In Internet of Things Television Telephony intranet Employer Employee Relationship Shortcut Network Congestion Cabling Reviews Startup Optimization Freedom of Information Smart Technology Wireless Hacks

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?