On Jan 27, 10:23 pm, [EMAIL PROTECTED] wrote:
> >> >[EMAIL PROTECTED]:~$ ndisasm error.txt
> >> >00000000  54                push sp
> >> >00000001  686973            push word 0x7369
> >> >00000004  206973            and [bx+di+0x73],ch
> >> >00000007  206E6F            and [bp+0x6f],ch
> >> >0000000A  7420              jz 0x2c
> >> >0000000C  61                popa
> >> >0000000D  7373              jnc 0x82
> >> >0000000F  656D              gs insw
> >> >00000011  626C65            bound bp,[si+0x65]
> >> >00000014  722E              jc 0x44
> >> >00000016  2E                db 0x2E
> >> >00000017  2E                db 0x2E
> >> >00000018  0A                db 0x0A
>
> >> >:/
>
> >> not sure what you're saying. Sure looks like assembler to me. Take the
> >> '54   push sp'. The 54 is an assembler opcode for push and the sp is
> >> the stack pointer, on which it is operating.
>
> >go troll somewhere else (you obviously don't know anything about
> >assembler and don't want to learn anything about Python).
>
> >-- bjorn
>
> before you start mouthing off, maybe you should learn assembler. If
> you're really serious, go to the Intel site and get it from the horses
> mouth. The Intel manual on assembler lists the mneumonics as well as
> the opcodes for each instruction. It's not called the Intel Machine
> Code and Assembler Language Manual. It's the bible on assembly
> language, written by Intel.
>
> If you're not so serious, here's a URL explaining it, along with an
> excerpt from the article:
>
> http://en.wikipedia.org/wiki/X86_assembly_language
>
> Each x86 assembly instruction is represented by a mnemonic, which in
> turn directly translates to a series of bytes which represent that
> instruction, called an opcode. For example, the NOP instruction
> translates to 0x90 and the HLT instruction translates to 0xF4. Some
> opcodes have no mnemonics named after them and are undocumented.
> However processors in the x86-family may interpret undocumented
> opcodes differently and hence might render a program useless. In some
> cases, invalid opcodes also generate processor exceptions.
>
> As far as this line from your code above:
>
> 00000001  686973            push word 0x7369
>
> 68 of 686973 is the opcode for PUSH. Go on, look it up. The 6973 is
> obviously the word address, 0x7369. Or, do you think that's
> coincidence?
>
> Don't fucking tell me about assembler, you asshole. I can read
> disassembled code in my sleep.

What was originally posted was:
"""
[EMAIL PROTECTED]:~$ cat error.txt
This is not assembler...

[EMAIL PROTECTED]:~$ ndisasm error.txt
00000000  54                push sp
00000001  686973            push word 0x7369
00000004  206973            and [bx+di+0x73],ch
[snip]
"""

Read it again -- he's "disassembled" the text "This is not
assembler..."

54 -> "T"
686973 -> "his"
206973 -> " is"

but you say "68 of 686973 is the opcode for PUSH. Go on, look it up.
The 6973 is obviously the word address, 0x7369. Or, do you think
that's coincidence?"

You are a genius of a kind encountered only very rarely. Care to share
with us your decryption of the Voynich manuscript?
-- 
http://mail.python.org/mailman/listinfo/python-list

Reply via email to