Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


Debugging techniques. Documentation ?

Posted on 2000-03-12
Medium Priority
Last Modified: 2011-09-20
I know this is a very general question so I just ask you for some links where  I can read about it. Thanx.
Question by:jorj
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
LVL 14

Accepted Solution

AlexVirochovsky earned 300 total points
ID: 2620190
Plus 1 
There are many, many URL about debugging. Can you be more specific?
What exectly you want to debug?


Author Comment

ID: 2622348
KO. More specific: I must debug a program written in C, used for few 386/DOS terminals, with a lot of #ifdef statements, and many C files. It seems that almoust nothing has been done in order to be easier to be debugged, and now each bug take me few days until I figure it out what's about. Maybe from your experience, what's to be done to  avoid those eat-time bugs ?
LVL 14

Expert Comment

ID: 2624206
What translator dou you use?
If you woks with BC , you can use
exellent debugger of borland:
td386.exe . If you use it, you don't need Thoery. You can make dump of memory,breakpoints, watch, inspect, ...
See td.hlp.

Author Comment

ID: 2626620
I have found what I wanted in your link, AlexV.

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Summary: This tutorial covers some basics of pointer, pointer arithmetic and function pointer. What is a pointer: A pointer is a variable which holds an address. This address might be address of another variable/address of devices/address of fu…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
The goal of this video is to provide viewers with basic examples to understand how to use strings and some functions related to them in the C programming language.
Video by: Grant
The goal of this video is to provide viewers with basic examples to understand and use while-loops in the C programming language.

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question