home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   comp.sys.tandy      Life is dandy cuz you're gettin a Tandy!      5,684 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 4,484 of 5,684   
   Mark McDougall to N Morrison   
   Re: batch boot-loader bounty   
   19 Feb 07 10:48:31   
   
   From: markm@vl.com.au   
      
   N Morrison wrote:   
      
   > On Feb 17, 5:16 am, "turnkit"  wrote:   
   >   
   >> I think the signature is 0102003C and then 1K of text and graphics and   
   >> then exactly 1K later there is a 0102003D  (Someone please correct   
   >> me... if there are variations, I never quite figured out why, or how   
   >> many there could be.)   
   >   
   > No, that's just one possibility and an odd one at that.   
   > 0102003C means "Load the next 256 bytes to the start of the screen   
   > (3C00)"   
   > 0102003D means "Load the next 256 bytes 1K above the screen"   
      
   If you define "splash screen" to mean a screen that is displayed whilst   
   the rest of the program is being loaded, then you might be able to   
   extract *some* of the screens by writing a program that parses the CMD   
   file and identifies blocks loaded directly into screen RAM. This of   
   course only works for disk files.   
      
   Tape loaders are another matter altogether.   
      
   I can only think of 1 or 2 programs with "splash screens" myself   
   (Frogger & Defense Command) so I'm wondering if it really is worth the   
   effort?   
      
   Regards,   
      
   --   
   Mark McDougall, Engineer   
   Virtual Logic Pty Ltd,    
   21-25 King St, Rockdale, 2216   
   Ph: +612-9599-3255 Fax: +612-9599-3266   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca