RE: Reverse Engineering

Yves Huguenin (yves.huguenin@urbanet.ch)
Sun, 24 May 1998 19:04:46 +0200

You may use a sniffer or better if you know the assembly language, use a
low level debugger (like softice) to watch want they do with the scanner and eventualy
dissassemble the driver.

Thor

-----Message d'origine-----
De: Fredrick P. Eisele Sr. [SMTP:feisele@ameritech.net]
Date: Sunday, 24 May, 1998 10:29 AM
A: sane-devel@mostang.com
Objet: Reverse Engineering

I have a scanner (for fingerprints) which connects
to the parallel port. I want to develop a SANE
interface for this beast but the company has not
been forthcoming with the specifications.
What is the best way to proceed with reverse
engineering?

The device can be run under NT and I see no evidence
of a driver (no *.sys file). How similar are the
NT and Linux lp drivers?
Should/can I put some kind of sniffer on the port?

Is there documentation on how to proceed with a
reverse engineering job?

Thanks,
Fred

--
Source code, list archive, and docs: http://www.mostang.com/sane/
To unsubscribe: echo unsubscribe sane-devel | mail majordomo@mostang.com

--
Source code, list archive, and docs: http://www.mostang.com/sane/
To unsubscribe: echo unsubscribe sane-devel | mail majordomo@mostang.com