> On the sourceforge pages for the 3com homeconnect
> (http://homeconnectusb.sourceforge.net) we've chronicled the details of our
> reverse engineering efforts.

Tanx but i can't find where it is. On the "old project home page" there is
a link to "His page detailing his investigations is here." But his is a
link to www.onslate.com which is to me an unknow host ...

> > I use a USB spy program under win32 to listen to the USB port while i'm
> > using the web cam. Do you knwo better spy program than "usb snoop" ?
>
> usb snoop is the tool I used to do the reverse engineering on the
> homeconnect.  You can read what we've done, you generally start by viewing
> the captured data as gray scale, this gives you an idea of whether or not
> you're looking at planar RGB, YUV, or some other format.  Then you start
> pointing the camera at sheets of your daughter's colored construction paper,
> break out your spreadsheet and start doing statistical analysis on the raw
> data against a "good" end product from the Win32 driver (what does the image
> payload data look like for an almost entirely red image?)

For now, i've just started trying to understand the packets before the cam
send images, it looks like configuration packet. But i'll certainly used
this technique to know what image format it's using. Great idea !

Tanx for you help

Munaut Sylvain

PS: I'm suscribed to the list, no need to send message to both the ml & me
~


_______________________________________________
[EMAIL PROTECTED]
To unsubscribe, use the last form field at:
https://lists.sourceforge.net/lists/listinfo/linux-usb-devel

Reply via email to