But wrap it in Java first, to bypass the ActiveX controls protection. Hmm,
can't think of a way to add Ellison to the mix, offhand. ;-)
Cheers,
Wayne
From: Chris Wedgwood <chris@cyphercom.com>
> The opcode sequence is 0xf0,0x0f,0xc7,0xc8 which disassemble to (according
> to the gnu-binutils) "lock cmpxchg8b %eax".
> .
> .
> .
> P.S. If you have gcc, then try something like this:
>
> main(){ __asm__(".byte 0xf0,0x0f,0xc7,0xc8"); }