At 12:07 AM 1/5/2005, Tom Jennings wrote:
On Mon, 3 Jan 2005, John Foust wrote:
This reminds me of the constraints on today's
exploits and code
injection techniques:
That sounds a bit much for the task at hand... !
Of course, in this case, your simple jump at the end would
do the trick.
At 02:37 PM
1/3/2005, Tom Jennings wrote:
debug will assemble for you! It jsut won't do
symbols.
And in your code, we'd need to know COMPORT, RDA, DATAPORT
and theexactsizeofKERMIT. Not remembering enough low-level DOS
myself, are the first three constants or something from a
BIOS call?
I am surprised that no one pointed out that the input,
store, incremnt
could more easily be done by:
Who was the one talking about overkill and excessive optimization? :-)
- John