Wine disassembly and reverse engineering rules.

James Hawkins truiken at gmail.com
Mon Aug 6 14:02:56 CDT 2007


On 8/5/07, Jakob Eriksson <jakob at vmlinux.org> wrote:
> Peter Dons Tychsen wrote:
> > By browsing MSDN, i found out that i can accomplish this by using the
> > documented function StalkWalk64(), which can examine the call stack. I
> > would then introduce this into the test system for DLLs like "user32".
> > By running the test on original Windows we could know which messages we
> > are incorrectly "posting" or "sending" where it should have been the
> > opposite. This could fix some vital issues.
> >
> > I don't think there is a problem as i am just using documented APIs from
> > MSDN, but since it includes looking at the call stack, i was curious if
> > there might be a legal problem.
> >
> > I don't want to put the idea to use or release it if it in any way is
> > illegal.
> >
> > Please think long and hard before you reply.
> >
>
> DMCA Reverse engineering exemption:
>
> http://www.chillingeffects.org/reverse/faq.cgi#QID210
>

>From the article:

"The reverse engineer is required to ask permission first, however."

...good luck with that.

-- 
James Hawkins



More information about the wine-devel mailing list