<?xml version="1.0"?>
<rss version="2.0">
    <channel>
        <title>OpenRCE: Blog</title>
        <link>http://www.openrce.org/rss/feeds/blog</link>
        <description>OpenRCE: The Open Reverse Code Engineering Community</description>
                <item>
            <title>Portable Executable Format Posters for Sale in A1 format</title>
                            <pubDate>Tue, 21 Feb 2012 10:00:44 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/2016/Portable_Executable_Format_Posters_for_Sale_in_A1_format</link>
                                        <author>bw &lt;email-suppressed@example.com&gt;</author>
                                                    <description>I've created &lt;b&gt;PE Format&lt;/b&gt; poster in &lt;b&gt;A1 59,4 x 84,1 cm&lt;/b&gt; format, including almost all of the structures from &lt;b&gt;PE/PE32+&lt;/b&gt; format (with comments from WinNT.h header file), if you would like to buy a printed copy, please &lt;a href=&quot;http://www.pelock.com/contact&quot;&gt;contact me&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.secnews.pl/2012/02/21/pe-format-poster-en/&quot;&gt;http://www.secnews.pl/2012/02/21/pe-format-poster-en/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img src=&quot;http://www.secnews.pl/wp-content/uploads/2012/02/pe_poster_1.png&quot; border=0 align=&quot;&quot;&gt;</description>
                    </item>
                <item>
            <title>RCE Directory</title>
                            <pubDate>Fri, 04 Apr 2008 19:29:07 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/1111/RCE_Directory</link>
                                        <author>bw &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Just a small project of mine - a link directory to RCE tools, blogs and everything else more or less related to &lt;i&gt;reverse engineering&lt;/i&gt;:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.rcedir.com&quot;&gt;http://www.rcedir.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Feel free to add your own links:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.rcedir.com/submit.php&quot;&gt;http://www.rcedir.com/submit.php&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
If you can't find proper category, just add your link to any available category and i will do the rest :)&lt;br /&gt;
&lt;br /&gt;
Thank you!</description>
                    </item>
                <item>
            <title>MultiExtractor File Ripper</title>
                            <pubDate>Thu, 19 Apr 2007 14:56:13 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/712/MultiExtractor_File_Ripper</link>
                                        <author>bw &lt;email-suppressed@example.com&gt;</author>
                                                    <description>&lt;a href=&quot;http://www.multiextractor.com&quot;&gt;MultiExtractor&lt;/a&gt; is a classic file ripper written by my friend Maciek, if you ever wanted to see what's hidden inside files at &amp;quot;C:\Program Files&amp;quot; this is the right tool (then you can go and complain to software developers about the size of their applications becouse of the hidden easter egg pictures :)&lt;br /&gt;
&lt;br /&gt;
Screenshots&lt;br /&gt;
&lt;a href=&quot;http://www.multiextractor.com/screenshots.html&quot;&gt;http://www.multiextractor.com/screenshots.html&lt;/a&gt;</description>
                    </item>
                <item>
            <title>VMware detection (anti-debugging trick against TRW)</title>
                            <pubDate>Sun, 15 Apr 2007 16:52:50 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/693/VMware_detection_(anti-debugging_trick_against_TRW)</link>
                                        <author>bw &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Binaries + source code&lt;br /&gt;
&lt;a href=&quot;http://www.pelock.com/blog/2007/04/15/vmware-detection-anti-debugging-trick-against-trw/&quot;&gt;http://www.pelock.com/blog/2007/04/15/vmware-detection-anti-debugging-trick-against-trw/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Some of the anti-debugging tricks can be used to detect VMware, one of them is an old anti TRW (TRW was a popular debugger in 9x days) trick.&lt;br /&gt;
&lt;br /&gt;
This anti-debugging trick works fine on a real Windows 9x installations (95, 98, ME) but it raises an exception under VMware (while reading IDT entry).&lt;br /&gt;
&lt;code&gt;&lt;br /&gt;
BOOL IsVMware9xTrw()&lt;br /&gt;
{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;// detect NT/XP/Vista&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;if ( (GetVersion() &amp;amp; 0x80000000) == 0 )&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;return FALSE;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;}&lt;br /&gt;
 &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;// detect VMWare (anti debugging trick against TRW)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;// VMware isn't detected with vm acceleration disabled&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;__try&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;__asm&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;sub&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;esp, 6&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;sidt&amp;nbsp;&amp;nbsp; fword ptr [esp]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;pop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;ax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;pop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;eax&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;mov&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;al, byte ptr [eax + 00Eh]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;}&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;}&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;__except(EXCEPTION_EXECUTE_HANDLER)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;return TRUE;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;}&lt;br /&gt;
 &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;return FALSE;&lt;br /&gt;
}&lt;br /&gt;
&lt;/code&gt;</description>
                    </item>
            </channel>
</rss>
