Sunday, November 4, 2018

Proof of concept

Using my macro shell I load an attachment qnd it registers with a name constructed out of the filename., the bottom device called SCRAPE, I can make cursors for that  and step through the plain text of the web.

$ join
SymCount SymCount 8
::Load scrape.dll
Exec
Library is loaded at address 6F600000.
Exec function is located at address 6F601990.
Eval function is located at address 6F601986.
Called Exec 0
Called Eval 0
::types
Exec
ID: 0 0 GRAPH
ID: 1 0 TEXT
ID: 2 0 MEM
ID: 3 0 CONSOLE
ID: 4 0 SCRAPE

No comments: