X-Git-Url: http://git.jankratochvil.net/?p=www.jankratochvil.net.git;a=blobdiff_plain;f=project%2Fcaptive%2Fdoc%2FReverse.pm;fp=project%2Fcaptive%2Fdoc%2FReverse.html.pl;h=d048b2010dfbc147d56ea12a2f7d9dc8a8b08cb2;hp=d444c87a516f3fa8018d987353732e8e31e2df98;hb=19c5ad8e26ac320516b8427c416a9195ce4fea48;hpb=4df4c5409020cd58d7dd7f98a88653c96e860dfb
diff --git a/project/captive/doc/Reverse.html.pl b/project/captive/doc/Reverse.pm
similarity index 90%
rename from project/captive/doc/Reverse.html.pl
rename to project/captive/doc/Reverse.pm
index d444c87..d048b20 100755
--- a/project/captive/doc/Reverse.html.pl
+++ b/project/captive/doc/Reverse.pm
@@ -1,8 +1,6 @@
-#! /usr/bin/perl
-#
# $Id$
# Captive project doc Reverse Engineering page Perl template.
-# Copyright (C) 2003 Jan Kratochvil This project has no intentions to reverse engineer and document the
filesystem data structures themselves since they are being encapsulated by
@@ -86,7 +84,7 @@ print <<"HERE";
interpret debug symbols from W32 .PDB
(Program DataBase) debug information files. You should use the following options for
dumpbin.exe: PDB file found at '.\\FILENAME.pdb' WinDbg is downloadable from:
@{[ a_href 'http://www.microsoft.com/whdc/ddk/debugging/installx86.mspx' ]}Reverse Engineering
+Reverse Engineering
dumpbin.exe
+ dumpbin.exe
WinDbg Windows NT kernel debugging
+ WinDbg Windows NT kernel debugging
Symbols should point to the directory where
reside files extracted from the symbol archive for your version of
Microsoft Windows. In the case of the
recommended Microsoft Windows XP Service Pack 1 Checked Build
@@ -161,7 +159,7 @@ print <<"HERE";
@{[ doc_img 'ntdebug-windbg-boot','Successfuly connected WinDbg' ]}
- Setup of the side being kernel-debugged
+