The third experimental report on the basic design of information security system

Source: Internet
Author: User

Experimental report on the basic design of information security system Experiment reports cover experiment contents

This experiment is based on ARM development platform transplant Uc/osii or uclinux. Master uc/osii (UCLinux ...) and Master C, the mixed programming of the Assembly.

Experimental steps
  1. With the experimental environment, connecting the test box, with the serial line, the line, network cable, connecting the experimental box and the host.
  2. Install the ads installation file in the 00-ads1.2 directory, the hack method 00-ads1.2\crack directory.
  3. Install the Giveio driver installation file in the 01-giveio directory: (1) Copy the entire Giveio directory to C:\WINDOWS, and copy the Giveio.sys file under the directory to c:/windows/system32/drivers. (2) In the Control Panel, select Add Hardware > Next > select-yes i have connected this hardware > Next > Check-Add New Hardware Device > Next > Check Install I manually select hardware from List > Next > select-Show All devices > Select-Install from disk-browse, specify drive as C:\WINDOWS\GIVEIO\giveio.inf file, click OK, install driver
  4. Install the Jtag driver installation files in the 02-uarmjtag2.0 directory, the steps are as follows: (1) After adding the driver UarmJtag2.0 installation, please connect the up-netarm3000 a simple emulator (C Jtag) to a PC, and then add the hardware, the steps are as follows (Take Windows XP as an example): Start a Control Panel add hardware one step at a time I have connected this hardware one step after one select one to add a new hardware device one step at a time select Install I manually choose the hardware from the list one step one select one to show all devices a selection (process longer) One browse from disk installation, specify driver for C:\Program files\uarmjtag\driver\lptjtag file, click OK, then click Next to install the driver. (2) Simulation Debugging Click "Initialize Configuration", in the popup dialog box, "Processor type", select the appropriate ARM7 or arms (default is ARM7, click OK; Execute menu options I Configure target in Axd to set Choose ADP as remote debugging, click Configure button to further set the specific parameters; Click the Select button to choose Remote Connection for ARM Ethernet driver, click the Configure button to enter the IP address of the simple parallel port emulator, Input 127.0.0.1 can be, can be simulated debugging.
  5. Configure HyperTerminal: Baud rate is 115200, data bit 8, no parity, stop bit 1, no data flow control.
  6. Test that the basic installation is correct, refer to document "03-Test document. doc", test program under 04-test directory; (1) First run ADS1.2 integrated development environment, click File->open option, select Project file we use/ucos in CD v6.0/ EXP11 Drawing API function as an example select EXP11.MCP and click Open. (2) Select the files that need to be compiled, click on the blank location in front of the corresponding folder to select, the header file library file is not selected, because it has been included in the source code. (3) Click Make to compile the link, compile the result after compiling, show no error, 4 warnings and 15 other information. (4) Be sure to open Uarmjtag Click Initialize Configuration selection ARM9 Click OK before the debugger runs. Minimize to the pallet and ensure our platform stops in the Vivi state. (5) Click the Debug button to simulate debugging, popup debugging interface; When the status is not available, click Options->configure Target, Pop-up dialog, click Configure, change the main two places name: Select Arm Ethernet Driver,configuration: Configure as: 127.0.0.1, click OK, then select ADP to click OK. If you have finished loading the text without any display, then you need to turn it off and run the debug once. Then click Debug again this time is the normal loading state. After the load is complete, click the Run button, and then the normal state will stop at the main function, which is the system automatically. Then continue clicking the Run button to run the drawing experiment. On the LCD screen we will be drawing a good figure. Please pause and exit the program before closing.

The third experimental report on the basic design of information security system

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.