230:
222:
218:
247:
I've used the tool infrequently (prefer IDA Pro), believe it or not, but I guess I wasn't very thorough before AfDing this -- the IDA Pro book doesn't give much info, but the others are valid, so I'll chalk this up to ibuprofen and/or general incompetence. Mea culpa.
226:
162:
217:- OllyDbg appears to be the tool of choice for many of those analysing viruses, or reverse engineering software. Coverage in the form of books appear to be readily available.
123:
300:
156:
233:
has coverage as well stating that it is "used by many malware analysts". There's more, but that should be sufficient to establish notability. --
17:
177:
96:
91:
49:
144:
100:
329:
36:
328:
Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a
83:
35:
Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a
256:
201:
138:
288:
134:
170:
315:
292:
263:
242:
208:
65:
58:
184:
311:
29:
The following discussion is an archived debate of the proposed deletion of the article below.
284:
275:
249:
238:
194:
150:
53:
307:
87:
117:
278:
to generate a more thorough discussion so a clearer consensus may be reached.
234:
79:
71:
322:
The above discussion is preserved as an archive of the debate.
225:
states it "has long been the staple of reversing communities".
48:. Nom seems to agree with only comment, which was Keep. (
229:
although not previewable clearly has a section on it.
113:
109:
105:
169:
283:Please add new comments below this notice. Thanks,
39:). No further edits should be made to this page.
332:). No further edits should be made to this page.
301:list of Software-related deletion discussions
183:
8:
299:Note: This debate has been included in the
298:
227:Reversing:secrets of reverse engineering
193:Lacks significant secondary coverage. —
223:Reverse engineering code with IDA Pro
7:
24:
18:Knowledge:Articles for deletion
1:
221:has a section on this tool.
349:
316:18:55, 27 April 2011 (UTC)
293:00:15, 26 April 2011 (UTC)
264:21:44, 20 April 2011 (UTC)
243:19:01, 20 April 2011 (UTC)
209:20:05, 19 April 2011 (UTC)
325:Please do not modify it.
32:Please do not modify it.
66:18:36, 3 May 2011 (UTC)
44:The result was
318:
304:
295:
231:Malware Forensics
63:
50:non-admin closure
340:
327:
305:
282:
280:
261:
260:
254:
219:Grey Hat Hacking
206:
205:
199:
188:
187:
173:
121:
103:
59:
56:
34:
348:
347:
343:
342:
341:
339:
338:
337:
336:
330:deletion review
323:
273:
258:
257:
250:
203:
202:
195:
130:
94:
78:
75:
62:
54:
37:deletion review
30:
22:
21:
20:
12:
11:
5:
346:
344:
335:
334:
319:
296:
281:
270:
269:
268:
267:
266:
191:
190:
127:
74:
69:
60:
42:
41:
25:
23:
15:
14:
13:
10:
9:
6:
4:
3:
2:
345:
333:
331:
326:
320:
317:
313:
309:
302:
297:
294:
290:
286:
279:
277:
272:
271:
265:
262:
255:
253:
246:
245:
244:
240:
236:
232:
228:
224:
220:
216:
213:
212:
211:
210:
207:
200:
198:
186:
182:
179:
176:
172:
168:
164:
161:
158:
155:
152:
149:
146:
143:
140:
136:
133:
132:Find sources:
128:
125:
119:
115:
111:
107:
102:
98:
93:
89:
85:
81:
77:
76:
73:
70:
68:
67:
64:
57:
51:
47:
40:
38:
33:
27:
26:
19:
324:
321:
274:
251:
214:
196:
192:
180:
174:
166:
159:
153:
147:
141:
131:
45:
43:
31:
28:
285:Ron Ritzman
157:free images
308:• Gene93k
252:anndelion
197:anndelion
276:Relisted
124:View log
163:WP refs
151:scholar
97:protect
92:history
80:OllyDbg
72:OllyDbg
135:Google
101:delete
178:JSTOR
139:books
118:views
110:watch
106:links
55:Monty
16:<
312:talk
289:talk
239:talk
235:Whpq
215:Keep
171:FENS
145:news
114:logs
88:talk
84:edit
46:keep
306:--
185:TWL
122:– (
61:845
314:)
303:.
291:)
248:—
241:)
165:)
116:|
112:|
108:|
104:|
99:|
95:|
90:|
86:|
52:)
310:(
287:(
259:❋
237:(
204:❋
189:)
181:·
175:·
167:·
160:·
154:·
148:·
142:·
137:(
129:(
126:)
120:)
82:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.