The implementation of "Expect 4 Windows" (E4W) uses some deep magic
with injecting a small piece of assembly code into the process it
talks to, to intercept the IO functions and reroute them to itself.
This is similar to how malware operates.
Thus the tighter security restrictions of the more recent Windows
releases (7+ I think) prevent E4W from working.
This is AFAIK.
The sources of E4W are open if you wish to see all the gory
details. See
https://sourceforge.net/projects/expect/files/Expect%204%20Windows/
--
So long,
Andreas Kupries <
akup...@shaw.ca>
<
http://core.tcl.tk/akupries/>
Developer @ HP Enterprise
Tcl'2015, Oct 19-23, Manassas, VA, USA,
http://www.tcl.tk/community/tcl2015/
-------------------------------------------------------------------------------