4 Operation Captive, codename "captive"
5 -------------------------------------
7 Existing binary Microsoft Windows file system drivers were exploited
8 for accessing drives with possibly proprietary file system data structures.
9 Open file system API is provided to access these file system drivers.
10 Microsoft Windows system components required by these drivers
11 were analyzed and successfuly emulated in the GNU/Linux operating system.
13 The implementation allows applications running under the GNU/Linux operating
14 system to access NTFS drives. File system driver compatibility with VFAT,
15 ISO9660 and EXT2 is also provided.
21 cvs -d :pserver:pserver@cvs.jankratochvil.net:/cvs login
22 Just hit ENTER (empty password)
23 cvs -d :pserver:pserver@cvs.jankratochvil.net:/cvs -z3 checkout -d captive priv/captive
25 cvs -d :pserver:pserver@cvs.jankratochvil.net:/cvs -z3 checkout -d reactos -r captive -kk priv/reactos
28 ./src/client/cmdline/captive-cmdline --load-module=/path/to/ntoskrnl.exe --filesystem=/path/to/cdfs.sys --cdrom --ro /path/to/image.bin
30 ./src/client/cmdline/captive-cmdline --load-module=/path/to/ntoskrnl.exe --filesystem=/path/to/fastfat.sys --disk --blind /path/to/image.bin
32 ./src/client/cmdline/captive-cmdline --load-module=/path/to/ntoskrnl.exe --filesystem=/path/to/ntfs.sys --disk --blind /path/to/image.bin
38 See the file 'INSTALL'.
44 See the file 'COPYING' and 'AUTHORS'.