Regards Matt Pietrek
发表于:
2007-4-18 13:03
7489
Actually I really don't want to talk about anything about Matt Pietrek since he is too famours.
Here I listed some of the very very famour and very very important articles that he has written.
Some undocumend secreats like SEH, PE File Structure is listed here, including a very famours
book which is Win95 System Programming Secrets.
95dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3A6K6K9r3q4K6L8g2)9J5k6i4y4H3j5h3y4W2M7#2)9J5k6h3I4A6N6X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6V1k6h3k6S2N6h3I4@1i4K6u0W2j5i4y4H3P5q4)9K6c8W2)9#2k6X3x3H3x3g2)9#2k6X3u0D9L8$3N6H3j5i4u0@1i4K6y4p5L8i4W2K6M7r3q4U0k6g2)9J5y4W2)9#2k6X3x3H3x3W2)9#2k6X3!0%4L8X3g2J5i4K6y4p5x3g2)9J5y4W2)9#2k6X3y4Q4x3@1c8T1L8r3!0Y4M7r3q4J5N6l9`.`. Win95 System Programming Secreats
a36K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3y4K6i4K6u0W2L8h3W2H3N6q4)9J5k6i4u0#2i4K6u0r3k6r3!0U0M7#2)9J5c8X3y4G2L8i4m8Q4x3V1k6W2L8X3N6Q4x3V1k6G2M7#2)9J5c8Y4N6A6L8U0x3J5i4K6u0r3N6$3W2F1z5e0g2Q4y4h3k6K6P5i4y4Q4y4h3k6H3M7X3!0Y4M7W2)9#2k6Y4y4W2j5%4u0Q4x3V1k6E0j5h3W2F1i4K6u0W2M7r3c8X3 eefK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8U0l9I4z5e0N6Q4x3V1k6q4P5r3y4W2M7s2c8A6L8$3&6Q4x3V1k6q4P5r3y4W2M7s2c8A6L8$3&6Q4x3X3g2S2M7%4m8^5
A Crash Course on the Depths of Win32™ Structured Exception Handling
9beK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6u0Q4x3V1j5H3x3W2)9J5c8W2m8q4i4K6u0r3
15eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6u0Q4x3V1j5H3x3#2)9J5c8W2m8q4x3W2)9J5c8X3c8W2k6X3q4#2L8s2c8Q4x3X3g2S2M7%4m8^5
672K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8Z5M7X3g2W2k6r3!0E0i4K6u0W2L8%4u0Y4i4K6u0r3M7$3!0D9j5i4u0Q4x3V1k6U0L8$3c8W2i4K6u0r3N6r3W2F1P5i4m8W2i4K6u0r3 (Related Document)
An In-Depth Look into the Win32 Portable Executable File Format Part1 and Part2
f8aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3^5J5i4K6u0W2L8h3W2U0M7X3!0K6L8$3k6@1i4K6u0W2j5$3!0E0i4K6u0r3k6h3&6Q4x3X3c8g2f1#2)9J5c8X3I4A6j5Y4u0S2M7Y4W2Q4x3V1k6E0M7K6R3H3z5e0M7$3x3W2)9J5k6h3q4K6M7s2R3`.
Peering Inside the PE: A Tour of the Win32 Portable Executable File Format
f5fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6u0Q4x3V1j5H3x3#2)9J5c8X3S2G2L8$3c8Q4x3V1j5`.
Improved Error Reporting with DBGHELP 5.1 APIs
78bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6u0Q4x3V1j5H3y4W2)9J5c8X3c8W2j5Y4g2Y4i4K6u0r3k6r3g2X3j5i4g2D9N6q4)9J5k6h3q4K6M7s2R3`.
a6fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6u0Q4x3V1j5H3z5q4)9J5c8V1g2K6j5$3q4H3k6h3k6J5L8$3#2p5e0p5I4t1k6h3I4D9i4K6u0r3
Escape from DLL Hell with Custom Debugging and Instrumentation Tools and Utilities
16bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6q4Q4x3V1j5H3x3#2)9J5c8X3I4W2j5h3E0K6i4K6u0r3
Resource Leaks: Detecting, Locating, and Repairing Your Leaky GDI Code
045K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6y4Q4x3V1j5I4x3W2)9J5c8V1y4J5K9i4c8A6j5$3q4D9f1$3g2U0N6r3W2G2L8Y4y4Q4x3V1k6V1k6h3k6S2N6h3I4@1i4K6u0W2j5i4y4H3P5l9`.`.
Break Free of Code Deadlocks in Critical Sections Under Windows
da7K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6q4Q4x3V1j5H3z5g2)9J5c8X3S2G2L8$3c8Q4x3V1k6V1k6h3k6S2N6h3I4@1i4K6u0W2j5i4y4H3P5l9`.`.
New Vectored Exception Handling in Windows XP
120K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6u0Q4x3V1j5H3y4g2)9J5c8V1S2G2L8$3c8Q4x3V1j5`.
Link-time Code Generation
1cdK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8X3q4J5j5$3S2A6N6X3g2Q4x3V1k6K6y4o6l9J5i4K6u0W2j5i4y4H3P5l9`.`.
58cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8U0p5J5z5e0S2Q4x3V1k6Z5L8$3!0V1i4K6u0r3K9r3!0G2k6o6p5J5z5e0S2Q4x3X3g2S2M7%4m8^5
a76K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8U0l9J5z5e0N6Q4x3V1k6Z5L8$3!0V1i4K6u0r3K9r3!0G2k6o6l9J5z5e0N6Q4x3X3g2S2M7%4m8^5
70cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8U0p5I4z5e0N6Q4x3V1k6Z5L8$3!0V1x3e0p5&6y4#2)9J5k6h3q4K6M7s2R3`.
059K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8U0l9&6z5e0S2Q4x3V1k6Z5L8$3!0V1x3o6V1&6z5q4)9J5k6h3q4K6M7s2R3`.
6e8K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8U0l9^5z5e0S2Q4x3V1k6Z5L8$3!0V1x3o6R3&6z5q4)9J5k6h3q4K6M7s2R3`.
eacK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8U0l9$3z5e0S2Q4x3V1k6Z5L8$3!0V1x3o6j5&6z5q4)9J5k6h3q4K6M7s2R3`.
Under the Hood
7deK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3e0l9H3x3q4)9J5c8X3#2W2N6r3q4V1j5i4c8S2i4K6u0r3
Avoiding DLL Hell: Introducing Application Metadata in the Microsoft .NET Framework
What Goes On Inside Windows 2000: Solving the Mysteries of the Loader
59eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6u0Q4x3V1j5H3x3#2)9J5c8V1I4G2j5h3c8W2M7W2)9J5c8R3`.`.
Detect and Plug GDI Leaks in Your Code with Two Powerful Tools for Windows XP
11eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6y4Q4x3V1j5H3x3g2)9J5c8V1N6p5d9f1I4W2j5h3E0K6i4K6u0r3
1caK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3^5J5i4K6u0W2L8h3W2U0M7X3!0K6L8$3k6@1i4K6u0W2j5$3!0E0i4K6u0r3k6h3&6Q4x3X3c8#2M7#2)9J5c8X3I4A6j5Y4u0S2M7Y4W2Q4x3V1k6E0M7K6R3I4x3o6b7K6x3W2)9J5k6h3q4K6M7s2R3`.
Rebasing Win32 DLLs: The Whole Story(Not By Matt)
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课