Radjena je na njemu metoda testpoint bypass, i ubacen je patchovanje erom...
Da bi vratio na normalu moras upisati sledece u GDFS
gdfswrite:0001085144554D4D5944415441
evo ovak..danas dobijem bijeli w580 da mu ubacim hrv jezik..mob spojim na setool i ono paf NIKAD OVO NISAM VIDIO :
ChipID:9900,EMP protocol:0301
erom_readvar: error reading unit 1/851
error while reading security units
SECURITY UNITS CAN'T BE READ !
DAMAGED FIRMWARE/GDFS OR EMPTY PHONE
Can't load ID loader !
Elapsed:4 secs.
e sad..mob radi normalno i sve i xs ga ucita bez ikakvog errora.sad je mene strah radit backup GDFS-a jer neznam dali je ostecen ili ne.. pa ak moze neki pametan odg od bilo koga i najbolje od Inovator-a ak zna
For the hoven lands...
Radjena je na njemu metoda testpoint bypass, i ubacen je patchovanje erom...
Da bi vratio na normalu moras upisati sledece u GDFS
gdfswrite:0001085144554D4D5944415441
ZTE Blade, Gen2, CM7 2.3.5 n148
si ti siguran da je to to da nebi ja kolegi kupio novi w580i gdje i kako da to upisem ? na netu sam ovo nasao :
that phone is tampered by d_reambox software.
during their famous method of "testpoint bypass", they writing patched erom with own custom loader embedded, patching simlock signature check and ... erasing simlock signature without any reason, which prevents setool2 from making backup.
fix is extremly simple:
using com/ufs write next script in SIGNED MODE (check ONLY "USE SIGNED MODE" on settings)
for db2020:
Code:gdfswrite:0001085144554D4D5944415441
ali gdje da to upisem i gdje je to use signed mode ??:S
Zadnji uredio Xulos : 18-07-2008 u 10:50
For the hoven lands...
mislim da ovo gdfswrite:0001085144554D4D5944415441 spremis kao neki *.txt dokumenz i sa XS-om ubacis kao skriptu u GDFS,za svaki slucaj prvo napravi backup
Bookmarks