[<<] [<] Page 1 of 1 [>] [>>] | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Subject:
Reverse Engeneering in PicStart Plus
From: Antonio Augusto Todo Bom Neto ####@####.#### Date: 3 Dec 2002 02:51:31 -0000 Message-Id: <1038883591.23644.15.camel@axc.lax> Does anybody know about any software to spy a Serial Port in Windows? I want to see what is sent to PicStart Plus in some commands that we don't have in picp docs. A software to spy what income and outgo throught the comm port? Best regards, Antonio Augusto Todo Bom Neto LAX Eletronica e Telecomunicacoes Ltda gEDA-BR - Users Group - http://gedabr.projetos.etc.br Chave Publica no Site www.keyserver.net chave de Antonio Augusto Todo Bom Neto ou tente pelo ID 5F7C385C, ou pelo link abaixo: http://search.keyserver.net:11371/pks/lookup?op=get&search=0x5F7C385C&template=netenextract,netennomatch,netenerror Fingerprint = 10C2 FEF8 0462 A985 E1AF F28C C58E 4BA5 5F7C 385C [Content type application/pgp-signature not shown. Download] | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Subject:
Re: Reverse Engeneering in PicStart Plus
From: Daniel Serpell ####@####.#### Date: 3 Dec 2002 16:27:48 -0000 Message-Id: <20021203162144.GA15883@aplik.cl> Hi! On Tue, Dec 03, 2002 at 12:46:32AM -0200, Antonio Augusto Todo Bom Neto wrote: > Does anybody know about any software to spy a Serial Port in Windows? > No, but you can run the software under Wine or vmware. Then, a simple strace can be used to spy all cammunications. Or I made a pogram long time ago to spy the serial port and print all the data. Daniel. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Subject:
Re: Reverse Engeneering in PicStart Plus
From: Antonio Augusto Todo Bom Neto ####@####.#### Date: 3 Dec 2002 16:41:35 -0000 Message-Id: <1038933364.10830.11.camel@axc.lax> Em Ter, 2002-12-03 às 06:34, John Sheahan escreveu: > On Tue, Dec 03, 2002 at 12:46:32AM -0200, Antonio Augusto Todo Bom Neto wrote: > > Does anybody know about any software to spy a Serial Port in Windows? > > > > I want to see what is sent to PicStart Plus in some commands that we > > don't have in picp docs. > > > > A software to spy what income and outgo throught the comm port? > > you can use a second pc and run a terminal program in it. > One that timestamps is nice but not essential. > > needs a little box connecting the rs232 connectors and tapping rxd to > the second PC. > tap txd and rxd using 2 ports on pc#2 while you are at it. So, I will try to make a Linux software to do a "pass-through" function. Then I am planning to connect a M$-Windoze micro in a comm port and a PicStart in another. And my program could be a digipeater, showing the communications in the comm ports. Best regards, Antonio Augusto Todo Bom Neto LAX Eletronica e Telecomunicacoes Ltda gEDA-BR - Users Group - http://gedabr.projetos.etc.br Chave Publica no Site www.keyserver.net chave de Antonio Augusto Todo Bom Neto ou tente pelo ID 5F7C385C, ou pelo link abaixo: http://search.keyserver.net:11371/pks/lookup?op=get&search=0x5F7C385C&template=netenextract,netennomatch,netenerror Fingerprint = 10C2 FEF8 0462 A985 E1AF F28C C58E 4BA5 5F7C 385C [Content type application/pgp-signature not shown. Download] | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Subject:
RE: Reverse Engeneering in PicStart Plus
From: "Richard Crossley" ####@####.#### Date: 3 Dec 2002 17:35:06 -0000 Message-Id: <001701c29af0$b8349ec0$2d25a8c0@digi01> http://www.sysinternals.com/ntw2k/freeware/portmon.shtml > -----Original Message----- > From: Antonio Augusto Todo Bom Neto ####@####.#### > Sent: 03 December 2002 16:36 > To: gnupic list > Subject: Re: Reverse Engeneering in PicStart Plus > > > Em Ter, 2002-12-03 às 06:34, John Sheahan escreveu: > > On Tue, Dec 03, 2002 at 12:46:32AM -0200, Antonio Augusto Todo Bom > > Neto wrote: > > > Does anybody know about any software to spy a Serial Port in > > > Windows? > > > > > > I want to see what is sent to PicStart Plus in some > commands that we > > > don't have in picp docs. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Subject:
RE: Reverse Engeneering in PicStart Plus
From: Antonio Augusto Todo Bom Neto ####@####.#### Date: 3 Dec 2002 22:07:57 -0000 Message-Id: <1038952965.10564.51.camel@axc.lax> Em Ter, 2002-12-03 às 15:23, Richard Crossley escreveu: > http://www.sysinternals.com/ntw2k/freeware/portmon.shtml Yeh! Many many thanks to all. Thanks to who sent me some codes, C programs, and general helps. Portmon was the perfect tool to my problem here. I just connected PicStart Plus to a Windows-2k and used MPLAB 6. I can see all comm between host and programmer. Protmon can save a log file anytime, it saves in text format, with <TAB> separators, in some collums. I used a pic16F629, a blank part, and I did the follows procedures: 1 . enable programer 2 - blank check 3 - erase flash device 4 - disable programmer Then, I did logs with a pic16f873, programmed part: 1 - enable programer 2 - black check - returned not blank 3 - erase flash device 4 - blank check - return blank ok 5 - disable programer - equal the other. - not logged I am senting more detais to this list tonight. -- Cumprimentos, Best regards, Antonio Augusto Todo Bom Neto LAX Eletronica e Telecomunicacoes Ltda gEDA-BR - Users Group - http://gedabr.projetos.etc.br Chave Publica no Site www.keyserver.net chave de Antonio Augusto Todo Bom Neto ou tente pelo ID 5F7C385C, ou pelo link abaixo: http://search.keyserver.net:11371/pks/lookup?op=get&search=0x5F7C385C&template=netenextract,netennomatch,netenerror Fingerprint = 10C2 FEF8 0462 A985 E1AF F28C C58E 4BA5 5F7C 385C [Content type application/pgp-signature not shown. Download] | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
[<<] [<] Page 1 of 1 [>] [>>] |