cvs.gedasymbols.org/archives/browse.cgi | search |
Date: | Sun, 31 Jan 1999 17:48:16 +0200 (IST) |
From: | Eli Zaretskii <eliz AT is DOT elta DOT co DOT il> |
X-Sender: | eliz AT is |
To: | Martin Str|mberg <ams AT ludd DOT luth DOT se> |
cc: | djgpp AT delorie DOT com |
Subject: | Re: Some Systems Defined |
In-Reply-To: | <791npj$niq$1@news.luth.se> |
Message-ID: | <Pine.SUN.3.91.990131174615.25759B-100000@is> |
MIME-Version: | 1.0 |
Reply-To: | djgpp AT delorie DOT com |
On 31 Jan 1999, Martin Str|mberg wrote: > Interesting. Where have you learnt that? A lot of related info (confirmed by detailed disassembly and deep investigations using special tools) can be found in the book by Andrew Schullman "Unauthorized Windows 95". It is based on beta releases of Windows 95, but the basic facts are valid to this day. Very educational, IMHO.
webmaster | delorie software privacy |
Copyright © 2019 by DJ Delorie | Updated Jul 2019 |