Reverse Engineering for Portability
My VoIP provider provides this neat little program that allows people to listen to their voicemail on their computer, trouble is it only runs in a Win32 environment from certain versions of Internet Explorer.
There is an executable that runs and takes a single parameter. I think that this parameter contains the location of the voicemail file on their server. The following is an example of one of the codes:
I know that it contains one of the following two strings:
vml-01.tor.primus.ca or mytbb.primus.ca.
I am clueless how I might go about decoding this string, if anyone has any thoughts as to were to begin?
I thought first of decompiling the program, I thought it was written in C# but the C# compiler I used didn't seem to agree with me.
I know when people do illegal activities and make key gens and stuff, they usually disassemble the application. Could this help?
In terms of legalities, I read the the end user agreement from my telephone company and it has nothing written about decompiling this application. And the application has no license agreement.
Any help would be appreciated.