Solved

what does the following do

Posted on 2006-06-25
5
248 Views
Last Modified: 2010-04-16
I have an example app i found on the web which uses the following line to create a command

cmd="\x02\x06\x33\x31\x30\x33\x03";

what does it actually do? Is there  a low level language being used?

Thanks!!
0
Comment
Question by:Halon
5 Comments
 
LVL 11

Accepted Solution

by:
Agarici earned 250 total points
ID: 16981714
it creates a string which contains the chars with those hex values: cmd[0] = 0x02, cmd[1] = 0x06, cmd[2] = 0x33 and so on (i can tell you that 0x33 is '!' 0x31 is '▼' and 0x30 is '▲' )

the basic idea is that you can use '\x' escape sequence to specify a char in a string by its hex value.

hth,
A.
0
 
LVL 4

Expert Comment

by:SmithJW
ID: 16982365
the string is just hex encoded character codes which you can look up here
http://www.lookuptables.com/

what else can you tell us about the sample code?
where is this command used?

no low level language is being used, but without some context its impossible to say what is actually happening.

0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article introduced a TextBox that supports transparent background.   Introduction TextBox is the most widely used control component in GUI design. Most GUI controls do not support transparent background and more or less do not have the…
Introduction Hi all and welcome to my first article on Experts Exchange. A while ago, someone asked me if i could do some tutorials on object oriented programming. I decided to do them on C#. Now you may ask me, why's that? Well, one of the re…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question