Eric Auer wrote:

> You can also do:
> debug jam.sys
> e 2d85 0a
> e 2938 fd
> e 2ccf 00
> w
> q
> This is shorter but also patches a JNZ which makes

You're right, but in my script memory offsets also match file offsets.
So you can take a disassembler, e.g., BIEW, load JAM.SYS to it and start
examining the code.

> JAM hang when it detects that you modify it :-p

Thanks for having continued my work! :-)

Robert Riebisch
BTTR Software

Register Now & Save for Velocity, the Web Performance & Operations 
Conference from O'Reilly Media. Velocity features a full day of 
expert-led, hands-on workshops and two days of sessions from industry 
leaders in dedicated Performance & Operations tracks. Use code vel09scf 
and Save an extra 15% before 5/3.
Freedos-user mailing list

Reply via email to