X-Authentication-Warning: delorie.com: mail set sender to djgpp-bounces using -f From: Martin Str|mberg Newsgroups: comp.os.msdos.djgpp Subject: Re: TSR of go32-v2.exe or TSR for unstubbed COFF executable loader available? Date: Tue, 1 Jun 2010 07:02:02 +0000 (UTC) Organization: Aioe.org NNTP Server Lines: 15 Message-ID: References: <8d7d82d4-ce66-4b31-80a9-f6b5d7ba65ef AT o1g2000vbe DOT googlegroups DOT com> NNTP-Posting-Host: qaUouysPpK6BiNgOdUVuCg.user.speranza.aioe.org X-Complaints-To: abuse AT aioe DOT org User-Agent: tin/1.4.7-20030322 ("Suggestions") (UNIX) (SunOS/5.9 (sun4u)) X-Notice: Filtered by postfilter v. 0.8.2 Bytes: 1446 To: djgpp AT delorie DOT com DJ-Gateway: from newsgroup comp.os.msdos.djgpp Reply-To: djgpp AT delorie DOT com Rod Pemberton wrote: >> I think (??) go32-v2.exe doesn't do much unless you want to run v2 >> and v1 binaries under each other (rare). > Compile an .exe. Run exe2coff. That leaves you with a "COFF executable". > Delete the .exe. Use go32-v2 to run the COFF executable. Run stubify to > get your .exe back. Why not compile an .exe. Run exe2coff. (Delete the exe to be sure.) And run it (type "./program" in the directory where the COFF image is). It works for me with bash. -- MartinS