On 8/5/07, Jakob Eriksson <[EMAIL PROTECTED]> wrote: > Peter Dons Tychsen wrote: > > By browsing MSDN, i found out that i can accomplish this by using the > > documented function StalkWalk64(), which can examine the call stack. I > > would then introduce this into the test system for DLLs like "user32". > > By running the test on original Windows we could know which messages we > > are incorrectly "posting" or "sending" where it should have been the > > opposite. This could fix some vital issues. > > > > I don't think there is a problem as i am just using documented APIs from > > MSDN, but since it includes looking at the call stack, i was curious if > > there might be a legal problem. > > > > I don't want to put the idea to use or release it if it in any way is > > illegal. > > > > Please think long and hard before you reply. > > > > DMCA Reverse engineering exemption: > > http://www.chillingeffects.org/reverse/faq.cgi#QID210 >
>From the article: "The reverse engineer is required to ask permission first, however." ...good luck with that. -- James Hawkins