But tonight, Arjun saw its true purpose.
"You faked a Windows error," Janet said, her tone shifting from skeptical to intrigued. "In real time. On a remote client. And the host never crashed?"
"Perfect," he whispered. The pitch room at 8:00 AM was glass and chrome. Janet sat front row, arms crossed. Her boss, a grizzled CEO named Frank, looked bored.
The premise was simple, almost silly. It was a hidden kernel driver that injected fake, hyper-realistic Windows error dialogs into any application. "Not Responding." "Fatal Exception." "Memory could not be 'written'." It didn't crash the machine; it just pretended to. It was a prop for training videos.
He subtly pressed a hidden macro on his keyboard. WinErrSim targeted only Janet's remote viewing window on her tablet.
He killed the simulation. Janet's screen instantly unfroze. The demo continued as if nothing had happened.
They couldn't show a real failure. That would be catastrophic.
Arjun stared at the blinking cursor on his black screen. It was 2:00 AM, and his new cybersecurity startup, Aegis Systems , had one shot at a Series A pitch in six hours. But the demo wasn't ready.
Arjun's heart hammered. "Trade secret."
The problem wasn't a bug. It was Janet .
The instruction at 0x75b3fc4e referenced memory at 0x00000000. The memory could not be "read".
Janet smirked. "See? It failed."
"Yes," Arjun said. "We call it 'Adversarial Error Injection.' We don't just block attacks. We simulate their preferred camouflage—the humble Windows error dialog—and neutralize it." After the pitch, Janet pulled him aside. "That wasn't just a demo, was it? You actually injected a fake error on my personal viewer. I felt my tablet stutter."
That night, he renamed the file. No longer Windows Error Simulator . It was now —the illusion that became his fortune.