![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||
|
||||||||||||||
![]() |
#1
|
|||
|
|||
![]() https://www59.zippyshare.com/v/H0ho4EDD/file.html
useful in 2004 H2 and old type emulators no BSOD and NO sharing violation.
__________________
dongle backup |
#2
|
|||
|
|||
![]() "sharing violation"?
Not see it with my emulator. ))
__________________
nodongle.biz |
#3
|
|||
|
|||
![]() only public SRM have it one with elite_r source,
do to 2F-AF buggy implementation, new envelope 790 - 811 use broken session H0039 protection, no fix possible in sys, not important anyway ring 3 emulators era.
__________________
dongle backup |
#4
|
|||
|
|||
![]() > new envelope 790 - 811 use broken session H0039 protection
It is not a problem. Absolutely. >no fix possible in sys, not important anyway ring 3 emulators era. Really? ))
__________________
nodongle.biz |
#5
|
|||
|
|||
![]() there is no way break WBEAS encryption with old < 2011 ways,
I not talk about lab or reversing in industrial espionage done in China or other governmental sponsored illegal RE activities I talk about "normal" backups, done with existing techniques and possibilities all I seen use ring 3 dll NOT ring 0 sys. not possible in 99% of cases, who can full reverse to firmware level? not many, this NOT done in back garage or basements .... if have fix, for that only idea in PM, I might be wrong NOT claim I know it all... just curios.
__________________
dongle backup Last edited by user1 : 03-01-2021 at 06:06 AM. |
#6
|
|||
|
|||
![]() >WBEAS?
WBAES can be come over upon by a few ways.
__________________
nodongle.biz |
#7
|
|||
|
|||
![]() yes use ring 3 emulators.
__________________
dongle backup Last edited by user1 : 03-02-2021 at 02:10 AM. |
#8
|
|||
|
|||
![]() > yes use ring 3 emulators.
Not only.
__________________
nodongle.biz |
#9
|
|||
|
|||
![]() no problem I can emulate any target reasonable target.
__________________
dongle backup |
#10
|
|||
|
|||
![]() Yes, of course, it is not a problem absolutely.
__________________
nodongle.biz |