Steamをインストール
ログイン
|
言語
简体中文(簡体字中国語)
繁體中文(繁体字中国語)
한국어 (韓国語)
ไทย (タイ語)
български (ブルガリア語)
Čeština(チェコ語)
Dansk (デンマーク語)
Deutsch (ドイツ語)
English (英語)
Español - España (スペイン語 - スペイン)
Español - Latinoamérica (スペイン語 - ラテンアメリカ)
Ελληνικά (ギリシャ語)
Français (フランス語)
Italiano (イタリア語)
Bahasa Indonesia(インドネシア語)
Magyar(ハンガリー語)
Nederlands (オランダ語)
Norsk (ノルウェー語)
Polski (ポーランド語)
Português(ポルトガル語-ポルトガル)
Português - Brasil (ポルトガル語 - ブラジル)
Română(ルーマニア語)
Русский (ロシア語)
Suomi (フィンランド語)
Svenska (スウェーデン語)
Türkçe (トルコ語)
Tiếng Việt (ベトナム語)
Українська (ウクライナ語)
翻訳の問題を報告
you have to disable kernel mode hardware enforced stack protection
EAC at this game is at it's Maximum Settings, causing that kernel stack protection is incompatible and also most preview Updates of Windows are incompatible too.
22621.1778 is a preview could cause a kernelbase.dll error in eventviewer with start_protected_game.exe
if you get the 30005/1275 error, It is caused by new Windows 11 Feature called kernel stack protection you can workaround the problem by deactivate this windows Feature.
Type into your taskbar
core isolation
deactivate the kernel stack protection
restart windows
if you have not this error you have a other problem
everything works fine on win11
it seams you do not know this "security feature" is a bugfix for a CPU internal hardware security hole created by the use of virtual cores and has nothing to do with invasive kernel drivers.
microsoft force this way that driver and software developers need now a expensive windows 11 certification to be able to code software for shadow stack usage.
All ransomware, malware and trojans that kernel stack protection is designed to protect against have been updated to abuse an internal Microsoft structure to gain shadow stack privileges.
The so-called security feature is already absolutely useless against any kind of malware
Have a reputable source, or a lengthy explanation to provide, such as backing up your claim?!
I would tend to agree with you, security measures can be defeated, but plain saying that security measures are useless, is simply careless and untrue!
It is still useful for past malware, that have not been updated.
Updating a piece of code, especially when touching stack rights, is not an easy task.
So even if the current malware have been updated, it can protect against old malware or old piece of dangerous code.
Avoiding to grant malware usage access, to a huge part of the users!