("qkumba" on HackZApple, Pouet, and EXETools)
("peterferrie" on OpenRCE, DOSBox, and GitHub)
("peter ferrie" on MAME Dev, Tuts4You, and StackExchange)
Principal Software Development Engineer, Microsoft Corporation
virus researcher, reverse-engineer and software preservationist
December 11: My Prince of Persia read/unpack routine.
November 8: Base64 decoder in 51 bytes (from 2001, rewritten without magic numbers).
November 8: Executable ASCII Base64 decoder in 102 bytes.
October 24: RC4 in 69 bytes.
October 22: I'm now an official MAME developer.
If Uli had called it the Air Guitar, then it might have been more popular. :-)
Peter Ferrie began working with computers in 1981.
In 1986, he began developing anti-virus software for Apple II PCs.
From 1992-1998, he worked for an Australian distributor of anti-virus software for IBM PCs, first McAfee Viruscan then Frisk F-Prot.
From 1998-2000, he worked for Frisk Software International in Iceland.
From 2000-2003, he worked for Symantec Corporation in Australia.
From 2003-2008, he worked for Symantec Corporation in the USA.
In 2008, he joined Microsoft Corporation.
Ferrie specialises in the analysis of Win32, Win64, Linux, and script malware, reverse engineering code on multiple platforms, and development of (anti-)emulators, (anti-)unpackers, and (anti-)debuggers.
He has been a speaker at various conferences. He is the most frequent contributor ever to the Virus Bulletin journal, supplying over 100 articles in 13 years.
He joined CARO (Computer Anti-virus Research Organisation) in 2001.
He received the Virus Bulletin 2010 award for greatest contribution to anti-malware in the last 10 years.
2011 2010 2009 2008 2007
2010 2008 2007 2006 2004 2001
2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001
x86/x64 Shellcode development
2011 2010 2009 2008 2007 2005 2004 2002 2001
2014 2013 2011 2010 2009 2007
The "Life In ..." series
My favourite demos
My favourite games
Compatibility fixes for demos and games
Old games that I finally beat
My Brøderbund info
My Infocom info
My Mindscape info
Scan of the Month 33
Apple II stuff
Old coding stuff
Print EICAR test string in 56 bytes
Every potentially executable field in a PE header
"10 PRINT" in 10 bytes
brainfck in 100 bytes (GitHub version)
Julia set fractal renderer MBR in 403 bytes
is_x64() in 5 bytes (including branch)
Tetranglix in 454 bytes
RC4 in 69 bytes (GitHub version)
Executable ASCII Base64 decoder in 102 bytes (GitHub version)
Base64 decoder in 51 bytes (originally written in 2001!) (GitHub version)
painters: 007, Angel, Aster, Banish, Bizar, Chams, Custom, Droogie (gallery), Dys, Kagent, Kaine, Kerupt, KOS, Mister E, Orsam, RCF, Ree, Rize, Sink, TPee, Unique (Sinz, Spice)
Apple II: Colwyn, Home Hacker, Maz, Prototype (not the ex-virus writer on IBM PCs) (Bandits, Plasmania), Rebel, San Inc (Karateka side A, Karateka side B), Seroster, TCS, TTT
Painters: 50mm Los Angeles
Apple II: Asimov (ftp), HackZApple
Comics: 9 Chickweed Lane, Baby Blues, General Protection Fault, Liō, Sinfest, User Friendly
Other: Oldskool, Old School ;-)
Is your HTML standards-compliant? Find out
Copyright (c) 1998-2014 Peter Ferrie
All rights reserved
Virus Bulletin article copyrights are held by Virus Bulletin Ltd,
but made available on this site for personal use free of charge
by permission of Virus Bulletin
This site is hosted by 000webhost.com