A fellow fan of retro reverse engineering, LowLevelMahn, suggested that I could simplify the task by first analyzing a minimal program compiled in QB30, and kindly offered me a “Hello world” executable to work on. However, my hopes of quickly dissecting this toy example were quickly frustrated: HELLO.EXE managed to crash a couple of well-regarded tools, and when I finally managed to open it, the few functions revealed did not tell much. On top of that, it became quickly clear that not only the program executable needed analysis, but also BRUN30.EXE, the BASIC runtime that it referenced.
Perhaps next time you are writing a command line application that's downloading lots of files in parallel, or doing some similar kind of parallel task, you could write a similar Ansi-escape-code-based progress bar so the user can see how their command is progressing.
,推荐阅读WPS官方版本下载获取更多信息
Материалы по теме:
Фото: Vlad Smilianets / Reuters