I copied the patched olly over to the fresh install and loaded the test.exe. Sure enough Olly will automatically connect to the symbol server.
However it gets stuck at :
Code:
Log data, item 9
Address=10000000
Message=Module D:\Program Files\Agnitum\Outpost Firewall\wl_hook.dll
I've tried disabling the firewall and restarting Olly only to see the same thing. Any idea how I could resolve this please?
Hmm. After a few attempts it seems to be stopping at randown system DLLs. I tried it once more and it didn't lock up.
It also downloaded the symbols autmatically.

I'm not sure what the problem was before but it now appears to work.
Now to confirm that the test.exe has the additonal symbols in the disassembly listing...
Well, it does work, I used win.exe in Iczelions tut #3 like you and shows a lot more symbol names than before which is great.
Thinking about it, I'm just not sure this additonal symbol infomation will enhance my debugging experience when debugging an exe without source or symbols. Would I be right in saying that this additonal symbol information would only be of value to guys like Kayaker and Matt Pietrek for example who like to see how the internals of the OS libraries and program work?
I loaded notepad.exe into Olly adn could see the benefits almost immediately, for example:
01004441 |> E8 052A0000 CALL notepad.01006E4B ; \notepad.01006E4B
Becomes:
01004441 |> E8 052A0000 CALL notepad.PrintIt ; \PrintIt
or :
01004570 |. A1 04960001 MOV EAX,DWORD PTR DS:[1009604]
Becomes:
01004570 |. A1 04960001 MOV EAX,DWORD PTR DS:[__security_cookie]
I think it must be down to my choice of the test binary I used, i.e., it just does't happen to use any functions which correspond to the new loaded symbol names.
Even if that is the case, it was a good exercise and I learned something into bargain.