Editing N900 GPS Reverse Engineering
Warning: You are not logged in.
Your IP address will be recorded in this page's edit history.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 139: | Line 139: | ||
[[User:sre|Sebastian Reichel]] writes a lowlevel library to access the N900's modem features and a wireshark plugin to analyze the packages. The information from above is currently only included in the Wireshark Plugin: | [[User:sre|Sebastian Reichel]] writes a lowlevel library to access the N900's modem features and a wireshark plugin to analyze the packages. The information from above is currently only included in the Wireshark Plugin: | ||
- | * [ | + | * [https://elektranox.org/n900/images/wireshark/04.png Screenshot] |
- | * [https://git.ring0.de/ | + | * [https://git.ring0.de/libisi/tree/wireshark-plugin Plugin] |
[http://maemo.org/profile/view/luke-jr Luke Dashjr] wrote small program in C which show GPS data from phonet modem stack. | [http://maemo.org/profile/view/luke-jr Luke Dashjr] wrote small program in C which show GPS data from phonet modem stack. |
Learn more about Contributing to the wiki.