cvs.gedasymbols.org/archives/browse.cgi   search  
Mail Archives: djgpp/1999/01/31/10:49:44

Date: Sun, 31 Jan 1999 17:48:16 +0200 (IST)
From: Eli Zaretskii <eliz AT is DOT elta DOT co DOT il>
X-Sender: eliz AT is
To: Martin Str|mberg <ams AT ludd DOT luth DOT se>
cc: djgpp AT delorie DOT com
Subject: Re: Some Systems Defined
In-Reply-To: <791npj$niq$1@news.luth.se>
Message-ID: <Pine.SUN.3.91.990131174615.25759B-100000@is>
MIME-Version: 1.0
Reply-To: djgpp AT delorie DOT com

On 31 Jan 1999, Martin Str|mberg wrote:

> Interesting. Where have you learnt that?

A lot of related info (confirmed by detailed disassembly and deep 
investigations using special tools) can be found in the book by Andrew 
Schullman "Unauthorized Windows 95".  It is based on beta releases of 
Windows 95, but the basic facts are valid to this day.  Very educational, 
IMHO.

- Raw text -


  webmaster     delorie software   privacy  
  Copyright © 2019   by DJ Delorie     Updated Jul 2019