You: guest [login] [register]
Che Guevara never used Windows.
MS-DOS books — buy link here
Scroll down for comments. Register to leave your one.
Spam?
On Wednesday June 9, 2021 Cholfatyarh said:
@Reziac: You cannot translate these hex values literally to ASCII text. It is an executable file. The hex values decode to "mov ax,4ch ; int 21h". This is just what the filename says: "return 0" (the program is executed and 0 is returned to the command interpreter as a status code, signalling successful execution).
On Sunday September 15, 2019 Edward F Gosser said:
It is Real MS-DOS Source code. Not 6.00 but is 5.00
On Friday August 16, 2019 Reziac said:
BTW return0.com is just a 5 byte file, in hex: b8 00 4c cd 21 that's a header-marker, a space, and the characters L=! I don't think that can be a virus. I think it's probably a status indicator for the build process.
This is a repack of the original leaked source (which did not include the 3 install disks). As I recall from examining it when it first appeared -- it's not actually DOS6 source; it's DOS5 source with some new DOS6 code in progress. (Not that it makes a lot of difference.) Looked to me like someone did a hasty job of zip-and-copy. Nonetheless, it's interesting stuff. For extra fun, grep for "IBM" and various swear words. :)
On Monday October 29, 2018 floppy said:
seems to be legitimate upon first inspection. looking at some of the assembly files now, this is cool stuff.
On Sunday December 10, 2017 NotARealNickName said:
for the issue with return0.com in source\c6ers\tools6\bin, this does not come up as infected on my machine. (Tested with Malwarebytes and Windows Defender)
On Friday November 3, 2017 Yitzy said:
Webroot claims that there is a win32.localinfect.0 virus in the file source/c6ers/tools6/bin/return0.com Is this just a false positive?
Main: Abandonware Home | Tree of Life | All Downloads — Services: Most wanted | Recently added | Search — Community: Contribute | Donate | Membership | Forum
© Juliano Vetus & partners, 2004-till the end of time | vetus@vetusware.com | rss