A1ex mentioned about some columns not saved in the raw file for 5D III https://www.magiclantern.fm/forum/index.php?topic=10111.msg104609#msg104609
Etiquette, expectations, entitlement...
@autoexec_bin | #magiclantern | Discord | Reddit | Server issues
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: maxtorine on November 23, 2022, 09:00:46 PMAsk the creater of Tornado EOS if the paid version will be able to solve your service menu issue.
Thank you! Never heard of that one but will give it a try if I can't find a free solution
function test()
camera.iso.value = 100
camera.shoot()
camera.iso.value = 200
camera.shoot()
camera.iso.value = 400
camera.shoot()
camera.iso.value = 800
camera.shoot()
camera.iso.value = 1600
camera.shoot()
camera.iso.value = 3200
camera.shoot()
camera.iso.value = 6400
camera.shoot()
camera.iso.value = 12800
camera.shoot()
camera.iso.value = 25600
camera.shoot()
camera.iso.value = 51200
camera.shoot()
camera.iso.value = 124000
camera.shoot()
end
keymenu = menu.new
{
name = "ISO photo bracket",
select = function(this) task.create(test) end,
}
Quote from: Walter Schulz on December 16, 2020, 01:20:01 PMAs you can see, people have figured out before how it works with other serial numbers from Canon.
Nothing we can do from here.
Only thing I can imagine is trying to contact stolencamerafinder admin and asking him to address this issue in some way. Maybe asking Canon users to look for len's funny number via EXIF and not trying to use a number unable to track.
Quote from: Walter Schulz on December 16, 2020, 09:46:24 AMThe problem may be when a lens gets stolen and the only lens serial number is the one in Exif.
Sorry! No correlation found.
Do you have any problem affected by this? Repo, legal, incurance claim, ... ?
Quote from: russellsnr on March 20, 2020, 02:22:37 PMI have been using Barracuda GUI for Windows https://www.magiclantern.fm/forum/index.php?topic=9102.0
Hi, In the middle or was in the middle of moving back to the UK but with the problems we are facing that has been put on hold, I normally use the Lightroom plugin to convert my dual iso files but that computer has been packed away but I have a small lap top running Windows 10 so where please can I download the stand alone version of the converting software for a Windows 10 computer. Thankyou.
Quote from: kayman1021 on September 29, 2019, 10:29:16 PMAlmost gone when using VNG4 in RawTherapee.
I had some success with the .cr2 file. After dropping it into Adobe DNG converter, I've recieved a 16bit uncompressed .dng file.
After many tries, I've managed to open the data. Stangely the inner data width is 5360 opposed with 5202 that is reported by RawTherapee. The additional data is not black, but very dark rectangle on the left. RawTherapee somehow just crops it. Height is 3465.
I've overwritten the values with vertical neighbour averages, and stuffed the data back into the dng. Black lines are gone, but there are visible artefacts, like above the eye.
https://drive.google.com/file/d/1Wf6caNNeuPfo5uhd0Aak-s_PRiPGsAs5/view?usp=sharing
Quote from: dim on September 21, 2019, 01:08:41 PMGot the same yesterday. Worked last time I tried. Ubuntu 18.04.
I tried Switch for the 1st time without problem on a ubuntu studio 18.10. It installed Yad , as planned. With a serie of pictures, dualiso, from the same Eos5DmkII, it doesn't work at all. I look at the log file & there, i don't understand the problem... The Switch files are in my Home directory. I followed the instructions. Can you help me?
The log file:
Quote from: Greg on September 02, 2019, 11:06:40 PMI got the same results when I with Hraw checked normal raw files from 90D.
DR analysis based on a lossy compressed CR3 file is not a good idea - https://www.canonrumors.com/initial-testing-shows-canons-new-32-5mp-aps-c-sensor-improves-dynamic-range-over-predecessor/
Quote from: a1ex on September 01, 2019, 07:17:35 AMDo you have more details how Canon's own bad pixel correction works? The only thing I know is the "lens cover on, manual sensor cleaning etc thingy", but nothing that explains how it works and why it doesn't always work.
Hardware issue - one of the 8 readout channels is no longer working.
What we can do, at software level, is to interpolate these dead columns as bad pixels (easiest to do in post-processing, but also doable in the camera, to some extent). Unsure whether Canon's own bad pixel correction feature would work here (didn't try).
In any case, this workaround will introduce some aliasing (somewhat similar to Dual ISO), but at least you will be able to keep using the camera for a while. Whether that's going to be a matter of days, months, or years until it fails completely, I have no idea.
Quote from: kitor on August 24, 2019, 11:41:15 PMCVE-2019-6001 published 6 August, firmware 1.3.0 published 7 August. 1.3.0 was already ready.
This info was published before those firmware were even mentioned elsewhere, so I assumed it was an error.
But yes, that makes sense.
Quote from: kitor on August 23, 2019, 12:12:22 PMNot fixed. https://www.magiclantern.fm/forum/index.php?topic=24385.msg219582#msg219582
R firmware 1.3: https://www.canon.co.uk/support/consumer_products/products/cameras/digital_slr/eos-r.html?type=firmware
RP firmware 1.2: https://www.canon.co.uk/support/consumer_products/products/cameras/digital_slr/eos-rp.html?type=firmware
No mentions about fixes for recent vulnerabilities.
Quote from: chris_overseas on August 12, 2019, 09:35:01 AMThey are vulnerable according to CVE. 7D together with WFT-E5 isn't on the other hand mentioned.
I doubt this is a concern, the vulnerabilities found aren't related to the firmware encryption. I also wonder if it's even possible for Canon to update the AES key with a firmware update.
"Even though our camera model doesn't support Bluetooth, some Bluetooth-related commands were apparently left behind, and are still accessible to attackers. In this case, we found a classic Stack-Based Buffer Overflow" - maybe those cameras don't have the Bluetooth code in their firmware, or different versions of it that aren't vulnerable?
Page created in 0.100 seconds with 13 queries.