Unauthorized Windows 95 Update
Updates to the book Unauthorized Windows 95 by Andrew Schulman
{TO DO: Introduction should mention where to get the book. Give email
addresses for Computer Literacy, Quantum?}
{TO DO: Probably reorganize this into a chapter-by-chapter update of the
book. Some of these will have associated files, some won't. For example,
mention that WINBOOT.SYS in chapter 1 is now IO.SYS, and that CAB32.EXE
in chapter 2 is now EXPLORER.EXE. For entirely-new
programs and files, have NEW!! starburst graphic? Or, make this a
top-level page, with a separate subpage each for CHGDIR, UNOBFUSC, K32EXP,
VXDCHAIN, with more details (e.g. sample output) on each page, showing
code fragments, headers, etc.?}
- CHGDIR -- Win32 Console app which
demonstrates that Win32 tasks in Windows 95 maintain the current
drive and directory in a Win16 task data block (TDB).
- UNOBFUSC -- Code to
de-obfuscate process and thread IDs in Win95.
- K32EXP -- Code to allow imports
by ordinal from KERNEL32.DLL in Win95. Useful for getting at
undocumented Win32 calls such as VxDCall and GetpWin16Lock.
- VXDCHAIN -- Win32 functions to
manipulate the Windows Virtual Device Driver (VxD) chain.
- W16LOCK -- A small Win32 program
which demonstrates the Win16Lock in Windows 95.
- WALKWIN -- A Win32 Console app
which does a recursive walk of the Windows 95 window list, showing
that all windows (even Win32 windows) have Win16 underpinnings.
- VM -- vm.c, vm.exe
- TH32 -- th32.c, th32.exe
- RANDRW -- randrw.c, randrw.exe
- MEMPROBE -- memprobe.c, memprobe.exe
- RUSSROUL -- russroul.c, russroul.exe