hello all,
i'm trying to reverse engineer the protocol for the polaroid pdc 700 digital
camera (currently unsupported by gphoto).
i'm using "comlite32" to snoop on the serial port of a windows machine while
downloading thumbnail images from the camera. it gets the data, and in
fact i THINK i may have the init string that this camera uses to identify
itself to windows applications.
the problem is comparing saved buffer files.
* they aren't written as text files, so i can't simply scp them over to a
linux box and view them.
* there doesn't seem to be an "export to text file" option.
* comlite32 doesn't seem to be able to send its buffer to a printer!
* when i try to compare two saved buffer side by side, it crashes windows
with an "illegal operation" error.
this is exasperating! comlite was written to reverse engineer serial port
hardware, but how are you supposed to do this when you can't even compare
saved buffers to look for common strings?
the plan is to write a library that gphoto2 can use to access this camera
(and i also have the polaroid pdc 2300Z which i'll work on next). but i need
to understand comlite better, or else get a better tool.
has anyone used this program?
has anyone used something similar under windows?
pete
--
"The following addresses had permanent fatal errors..." [EMAIL PROTECTED]
-- Mailer Daemon www.dirac.org/p