4 Operation Captive, codename "captive"
5 -------------------------------------
7 Existing binary Microsoft Windows file system drivers were exploited
8 for accessing drives with possibly proprietary file system data structures.
9 Open file system API is provided to access these file system drivers.
10 Microsoft Windows system components required by these drivers
11 were analyzed and successfuly emulated in the GNU/Linux operating system.
12 Currently the implementation allows applications running under the GNU/Linux
13 operating system to access VFAT, ISO9660 and EXT2 drives. NTFS file system
14 capability target is the final goal being currently developed on the base
15 of this project assets.
21 cvs -d :pserver:pserver@cvs.jankratochvil.net:/cvs login
22 Just hit ENTER (empty password)
23 cvs -d :pserver:pserver@cvs.jankratochvil.net:/cvs -z3 checkout -d captive priv/captive
25 cvs -d :pserver:pserver@cvs.jankratochvil.net:/cvs -z3 checkout -d reactos -r captive -kk priv/reactos
28 ./src/client/cmdline/captive-cmdline --load-module=/path/to/ntoskrnl.exe --filesystem=/path/to/cdfs.sys --cdrom --ro /path/to/image.bin
30 ./src/client/cmdline/captive-cmdline --load-module=/path/to/ntoskrnl.exe --filesystem=/path/to/fastfat.sys --disk --blind /path/to/image.bin
36 See the file 'INSTALL'.
42 See the file 'COPYING' and 'AUTHORS'.