Solved

A graphic mouse in TEXT mode

Posted on 1997-09-19
4
423 Views
Last Modified: 2006-11-17
I'm looking for a way to creat a graphic cursor in TEXT mode to a mouse, I know that the definishion need to be something with longint I.E. the shape of the cursor + the mask....
I want to put it in my mouse unit...

Thank you very mooch
0
Comment
Question by:Ido_Kanner_Log_In
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 2

Expert Comment

by:kellyjj
ID: 1215893
I think if you telnet/dial into borland's bbs they have mouse units.
0
 

Author Comment

by:Ido_Kanner_Log_In
ID: 1215894
Edited text of question
0
 

Author Comment

by:Ido_Kanner_Log_In
ID: 1215895
Edited text of question
0
 
LVL 10

Accepted Solution

by:
rbr earned 50 total points
ID: 1215896
The define your mouse-cursor in the text mode use function 0Ah of interrupt 33h (mouse-interrupt).
AX=000Ah
BX=0 (0= Software cursor, 1=Hardwarecursor)
CX= And mask
DX= Xor mask

How do you work with these 2 masks.
First the charactercode and the attribut of the character under the mouse is stored in a 16bit number. This number will be anded with the and mask and after this the xor operation will be executed.
So you are mouse cursor can appear in different shapes.

1.) Change the color use the character under the mouse.

CX:=00FFh
DX:=xx00H  xx= is the color

2.) Change the character use the color of the character under the mouse
CX:=FF00h
DX:=00xxh  xx= is the new character

3.) Keep the character invert the color.
CX:=FFFFh
DX:=FF00h

and there are much more combinations.




0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A look at what happened in the Verizon cloud breach.
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question