首页
社区
课程
招聘
Regards Matt Pietrek
发表于: 2007-4-18 13:03 7489

Regards Matt Pietrek

2007-4-18 13:03
7489

Actually I really don't want to talk about anything about Matt Pietrek since he is too famours.

Here I listed some of the very very famour and very very important articles that he has written.

Some undocumend secreats like SEH, PE File Structure is listed here, including a very famours

book which is Win95 System Programming Secrets.

95dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3A6K6K9r3q4K6L8g2)9J5k6i4y4H3j5h3y4W2M7#2)9J5k6h3I4A6N6X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6V1k6h3k6S2N6h3I4@1i4K6u0W2j5i4y4H3P5q4)9K6c8W2)9#2k6X3x3H3x3g2)9#2k6X3u0D9L8$3N6H3j5i4u0@1i4K6y4p5L8i4W2K6M7r3q4U0k6g2)9J5y4W2)9#2k6X3x3H3x3W2)9#2k6X3!0%4L8X3g2J5i4K6y4p5x3g2)9J5y4W2)9#2k6X3y4Q4x3@1c8T1L8r3!0Y4M7r3q4J5N6l9`.`.

Win95 System Programming Secreats

a36K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3y4K6i4K6u0W2L8h3W2H3N6q4)9J5k6i4u0#2i4K6u0r3k6r3!0U0M7#2)9J5c8X3y4G2L8i4m8Q4x3V1k6W2L8X3N6Q4x3V1k6G2M7#2)9J5c8Y4N6A6L8U0x3J5i4K6u0r3N6$3W2F1z5e0g2Q4y4h3k6K6P5i4y4Q4y4h3k6H3M7X3!0Y4M7W2)9#2k6Y4y4W2j5%4u0Q4x3V1k6E0j5h3W2F1i4K6u0W2M7r3c8X3

eefK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8U0l9I4z5e0N6Q4x3V1k6q4P5r3y4W2M7s2c8A6L8$3&6Q4x3V1k6q4P5r3y4W2M7s2c8A6L8$3&6Q4x3X3g2S2M7%4m8^5

A Crash Course on the Depths of Win32™ Structured Exception Handling

9beK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6u0Q4x3V1j5H3x3W2)9J5c8W2m8q4i4K6u0r3

15eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6u0Q4x3V1j5H3x3#2)9J5c8W2m8q4x3W2)9J5c8X3c8W2k6X3q4#2L8s2c8Q4x3X3g2S2M7%4m8^5

672K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8Z5M7X3g2W2k6r3!0E0i4K6u0W2L8%4u0Y4i4K6u0r3M7$3!0D9j5i4u0Q4x3V1k6U0L8$3c8W2i4K6u0r3N6r3W2F1P5i4m8W2i4K6u0r3 (Related Document)

An In-Depth Look into the Win32 Portable Executable File Format Part1 and Part2

f8aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3^5J5i4K6u0W2L8h3W2U0M7X3!0K6L8$3k6@1i4K6u0W2j5$3!0E0i4K6u0r3k6h3&6Q4x3X3c8g2f1#2)9J5c8X3I4A6j5Y4u0S2M7Y4W2Q4x3V1k6E0M7K6R3H3z5e0M7$3x3W2)9J5k6h3q4K6M7s2R3`.

Peering Inside the PE: A Tour of the Win32 Portable Executable File Format

f5fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6u0Q4x3V1j5H3x3#2)9J5c8X3S2G2L8$3c8Q4x3V1j5`.

Improved Error Reporting with DBGHELP 5.1 APIs

78bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6u0Q4x3V1j5H3y4W2)9J5c8X3c8W2j5Y4g2Y4i4K6u0r3k6r3g2X3j5i4g2D9N6q4)9J5k6h3q4K6M7s2R3`.

a6fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6u0Q4x3V1j5H3z5q4)9J5c8V1g2K6j5$3q4H3k6h3k6J5L8$3#2p5e0p5I4t1k6h3I4D9i4K6u0r3

Escape from DLL Hell with Custom Debugging and Instrumentation Tools and Utilities
16bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6q4Q4x3V1j5H3x3#2)9J5c8X3I4W2j5h3E0K6i4K6u0r3

Resource Leaks: Detecting, Locating, and Repairing Your Leaky GDI Code

045K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6y4Q4x3V1j5I4x3W2)9J5c8V1y4J5K9i4c8A6j5$3q4D9f1$3g2U0N6r3W2G2L8Y4y4Q4x3V1k6V1k6h3k6S2N6h3I4@1i4K6u0W2j5i4y4H3P5l9`.`.

Break Free of Code Deadlocks in Critical Sections Under Windows

da7K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6q4Q4x3V1j5H3z5g2)9J5c8X3S2G2L8$3c8Q4x3V1k6V1k6h3k6S2N6h3I4@1i4K6u0W2j5i4y4H3P5l9`.`.

New Vectored Exception Handling in Windows XP

120K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6u0Q4x3V1j5H3y4g2)9J5c8V1S2G2L8$3c8Q4x3V1j5`.

Link-time Code Generation

1cdK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8X3q4J5j5$3S2A6N6X3g2Q4x3V1k6K6y4o6l9J5i4K6u0W2j5i4y4H3P5l9`.`.

58cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8U0p5J5z5e0S2Q4x3V1k6Z5L8$3!0V1i4K6u0r3K9r3!0G2k6o6p5J5z5e0S2Q4x3X3g2S2M7%4m8^5

a76K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8U0l9J5z5e0N6Q4x3V1k6Z5L8$3!0V1i4K6u0r3K9r3!0G2k6o6l9J5z5e0N6Q4x3X3g2S2M7%4m8^5

70cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8U0p5I4z5e0N6Q4x3V1k6Z5L8$3!0V1x3e0p5&6y4#2)9J5k6h3q4K6M7s2R3`.

059K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8U0l9&6z5e0S2Q4x3V1k6Z5L8$3!0V1x3o6V1&6z5q4)9J5k6h3q4K6M7s2R3`.

6e8K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8U0l9^5z5e0S2Q4x3V1k6Z5L8$3!0V1x3o6R3&6z5q4)9J5k6h3q4K6M7s2R3`.

eacK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2A6j5%4u0G2M7$3!0X3N6q4)9J5k6h3y4G2L8g2)9J5c8X3#2K6K9W2)9J5c8U0l9$3z5e0S2Q4x3V1k6Z5L8$3!0V1x3o6j5&6z5q4)9J5k6h3q4K6M7s2R3`.

Under the Hood

7deK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3e0l9H3x3q4)9J5c8X3#2W2N6r3q4V1j5i4c8S2i4K6u0r3

Avoiding DLL Hell: Introducing Application Metadata in the Microsoft .NET Framework
What Goes On Inside Windows 2000: Solving the Mysteries of the Loader
59eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6u0Q4x3V1j5H3x3#2)9J5c8V1I4G2j5h3c8W2M7W2)9J5c8R3`.`.

Detect and Plug GDI Leaks in Your Code with Two Powerful Tools for Windows XP

11eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3&6Q4x3X3g2E0K9h3y4J5L8%4y4G2k6Y4c8Q4x3X3g2U0L8$3#2Q4x3V1k6E0M7$3c8F1L8h3q4Y4i4K6u0r3K9i4y4K6N6h3g2K6i4K6u0r3x3o6y4Q4x3V1j5H3x3g2)9J5c8V1N6p5d9f1I4W2j5h3E0K6i4K6u0r3

1caK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2K6k6r3^5J5i4K6u0W2L8h3W2U0M7X3!0K6L8$3k6@1i4K6u0W2j5$3!0E0i4K6u0r3k6h3&6Q4x3X3c8#2M7#2)9J5c8X3I4A6j5Y4u0S2M7Y4W2Q4x3V1k6E0M7K6R3I4x3o6b7K6x3W2)9J5k6h3q4K6M7s2R3`.

Rebasing Win32 DLLs: The Whole Story(Not By Matt)


[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费 7
支持
分享
最新回复 (2)
雪    币: 2506
活跃值: (1050)
能力值: (RANK:990 )
在线值:
发帖
回帖
粉丝
2
Thanks!
2007-4-18 13:26
0
雪    币: 201
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
3
慧眼识英雄呀
2007-5-8 08:26
0
游客
登录 | 注册 方可回帖
返回