Vous l'avez peut être vu passé il y a quelques mois, vous trouverez ci-dessous le lien pour télécharger la "Tool collection for the Lindbergh arcade".
https://github.com/crediar/lindbergh
Une copie de sauvegarde dans mon cloud :
https://mega.nz/#!uk8HEQZI!fXNiiZvbYp66V0ix2CAKkmo2jdAiX3C9FPKdJBDAMGI
Le fichier "read me" :
lindbergh
Tool collection for the Lindbergh arcade
Getting the inquiry bytes
The extended inquiry 0xEC reply is required to create the keys. The easiest way is to use plscsi this exists for windows and linux and is very easy to use. Just send the following command to get the required bytes:
plscsi -v -p -x "85 08 0E 00 00 00 01 00 00 00 00 00 00 00 EC 00" -i x200 -t inq.bin
Unlocking Commands
Each devices uses a slightly different unlock command again using plscsi will simplfiy things:
Unlock Maxtor HDDs:
plscsi -v -p -x "85 0A 06 00 00 00 01 00 00 00 00 00 00 40 F2 00" -o x200 -f key.bin
Unlock ADTec CF cards:
plscsi -v -p -x "85 0A 06 00 03 00 01 00 AB 00 00 00 00 00 82 00" -o x200 -f key.bin
Unlock SanDisk:
The tool will create the bytes for you simply insert them between the ""s
plscsi -v -p -x ""
BIOS password
mssvhy
Run your own stuff
Hook up a keyboard via USB and press CTRL+ALT+S to enter the BIOS. Enter the password: mssvhy Set "Boot Lock Sequence" in the Advanced tab to disabled.
Remarque : le password "mssvhy" est en clavier QWERTY...Sur clavier AZERTY ce sera donc "?ssvhy".
I want to unlock the lindbergh CF card. So just connect the card reader to PC and type the cmd in plscsi and CF can be readable on windows PC?
RépondreSupprimer