Friday, 30 September 2016
Lenovo A3300HV MTK6582 100 tested scatter file
Lenovo A3300HV MTK6582 100 tested scatter file
PASWORD= lanovo12
DOWNLODE LINK
Available link for download
Al Di Meola 1977 Elegant Gypsy SACD ISO S 0 L 0
Al Di Meola 1977 Elegant Gypsy SACD ISO S 0 L 0
Categorie: Musique
Taille de lupload: 1.5 GB
Status: 0 seeders et 0 leechers
Ajouté le: 2016-07-23 18:26:59
from Torrent411 Torrent Tracker - RSS Feed http://ift.tt/2a3qwRY
via IFTTT
Available link for download
Galaxy S7 S7 Edge SM G935 FRP Google Samsung Account removal
Galaxy S7 S7 Edge SM G935 FRP Google Samsung Account removal
Galaxy S7 & S7 Edge SM-G935 FRP Google Samsung Account removal hot hot
Available link for download
Orphan Black S04E04 FRENCH 720p WEB DL AAC2 0 H264 LiBERTY S 0 L 0
Orphan Black S04E04 FRENCH 720p WEB DL AAC2 0 H264 LiBERTY S 0 L 0
Categorie: Série TV
Taille de lupload: 1.25 GB
Status: 0 seeders et 0 leechers
Ajouté le: 2016-07-23 22:17:10
from Torrent411 Torrent Tracker - RSS Feed http://ift.tt/2aha3wC
via IFTTT
Available link for download
Insyde BIOS Modding Hidden Settings
Insyde BIOS Modding Hidden Settings
Despite what Ive already gone over in this blog, theres still more to be unlocked in the setup utility. You can see proof of this by going through the setup utilitys module with a hex editor. Theres tons of strings that cant be seen under normal circumstances. Heres just a few that I noticed right away:
The most common way of unlocking most of these hidden options is to modify the internal form representation, IRF, used in EFIs human interface infrastructure, HII, protocol. This is whats used to create everything in the setup utilitys interface. Unfortunately this is not the same as the standard IA-64 assembly that weve worked with in the past, so were going to have to learn some stuff before we can modify it. I post a program I made to assist in the disassembly of this code later in this tutorial, so you can skim though most of this if you dont care about the details.
The resources I found the most useful when researching this protocol were the latest Intels EFI Human Interface Infrastructure Specifications, which can be found here, and the EfiInternalFormRepresentation.h specification file found in the latest EDK II toolchain, which can be found here. I highly recommend you at least skin over these two documents so you can understand everything I say in this tutorial. Lets extract the setup module from our BIOS and examine the HII sections of it with a hex editor. Ill quickly go over how to find out which module this is first.
To get started make sure you unpack your BIOS installer so that you have access to the BIOS rom. If you want to follow along with this tutorial by using the same BIOS as me, then you can get it here. Now open the rom with Andys tool, go to the structure view, check the Decompress Extracted Modules box, and extract the DXE Core module. The latest version of Andys tool can be downloaded here.
So lets search for this string in our DXE Core module and see if it exists. Awesome! It found it.
Now we know were in the correct module. So search for the hex values 4D 5A. These values are always at the start of a module, and the name of a module is always at the end of a module. So heres what it finds:
I circled the modules name in red. So now we need to remember the GUID of the SetupUtility module. Lets go back to Andys tool to see what it is.
My SetupUtility GUID is FE3542FE-C1D3-4EF8-657C-8048606FF670. So lets open this module with a hex editor to get a better understanding of how to mod it. To do this, open the file in the DUMP folder created by Andys tool in the same directory as your BIOS rom. Make sure you open the largest file because there will be several with similar names.
Now we can get started looking at the HII protocol. First we need to find the HII database header as this will tell us the initial offsets of our string packages and form sets. You can usually locate this header because it starts off with an obvious identifier. Mine starts with the $SBV, but yours might start off with something different. Id recommend skimming through the entire file until you notice something similar to it. Its usually located right before the start of the first string package.
As you can see, it tells us some pretty useful things. Both offsets are stored in little endian, so just reverse the byte order if your having trouble reading the values. Heres the data structure I made to contain these values:
struct EFI_HII_DATABASE_HEADER {
uint32_t Offset;
string Identifier;
uint32_t StartStringPackages;
uint32_t StartFormSets;
};
All BIOS might now implement this header the same way, so I dont rely on it in my program. Now that we know the offset of the first string package, lets take a look at it. Heres mine:This follows the EFI_IFR_STRING_PACK structure thats described in the specification file I mentioned earlier. The picture points out some of the more important things. Lets talk about what a string package is before we go any further. To add support for multiple languages, strings are stored in groups depending on their language types. So the HII database will store all these individual string packages and reference them if the user selects their corresponding setting under the language option. Each string in a package is given a unique string ID. These start off at 0x00 and increase in 0x01. increments. For your setup to use a specific string, it must reference that strings string ID. A string package header is followed by a series of offsets that each correspond to the location of a string in that package. Past all these offsets, the actual strings are stored. You can verify this yourself by scrolling down a little bit below the string package header. Youll quickly see the strings start out with their localization strings, like eng and English. String packages might not all be stored in together in the module, so I take this into account in my program. In addition, theres one string package per language. Heres the data structures I made to contain string packages:
struct EFI_HII_PACK_HEADER {
uint32_t Offset;
uint32_t Length;
uint16_t Type;
};
struct EFI_IFR_STRING_PACK {
EFI_HII_PACK_HEADER Header;
uint32_t LanguageNameString;
uint32_t PrintableLanguageString;
uint32_t NumStringPointers;
uint32_t Attributes;
string *Strings;
};
Now lets go check out the first form sets header whose offset was given to us by the HII database header we mentioned earlier. Heres mine:Sorry this picture got kind of messy with all the arrows. I tired to circle some of the more important things, like the title value which contains the string ID that corresponds to the name of the form set. In my case, the string ID 0x0022 refers to the string Main. So this is the Main tab. This header follows the EFI_IFR_FORM_SET structure. Similar to the string packages, the form sets might be scattered throughout the module. After the header, all the IFR instructions are stored which can all be examined more closely by looking at the documentation. The last instruction in any form set is the EFI_IFR_END_FORM_SET_OP. A form set is just another name for the tabs in your setup utilitys menu, so we can dissect the menu more thoroughly by looking at the instructions used in each form set. Theres one form set per tab. So heres the form set data structures:
struct EFI_IFR_OP_HEADER {
uint32_t Offset;
uint8_t Opcode;
uint8_t Length;
};
struct EFI_IFR_FORM_SET {
EFI_HII_PACK_HEADER Header;
string Guid;
uint16_t FormSetTitle;
uint16_t Help;
uint64_t CallbackHandle;
uint16_t Class;
uint16_t Subclass;
uint16_t NvDataSize;
};
Lets look at the first instruction in the first form. The first byte of an instruction is its opcode, so lets see what the instruction is by looking at the opcodes value. As a side note, the second byte of an instruction is the length of that instruction including its opcode. Heres a list of opcodes for all the instructions used in EFIs IFR protocol: #define EFI_IFR_FORM_OP 0x01
#define EFI_IFR_SUBTITLE_OP 0x02
#define EFI_IFR_TEXT_OP 0x03
#define EFI_IFR_GRAPHIC_OP 0x04
#define EFI_IFR_ONE_OF_OP 0x05
#define EFI_IFR_CHECKBOX_OP 0x06
#define EFI_IFR_NUMERIC_OP 0x07
#define EFI_IFR_PASSWORD_OP 0x08
#define EFI_IFR_ONE_OF_OPTION_OP 0x09
#define EFI_IFR_SUPPRESS_IF_OP 0x0A
#define EFI_IFR_END_FORM_OP 0x0B
#define EFI_IFR_HIDDEN_OP 0x0C
#define EFI_IFR_END_FORM_SET_OP 0x0D
#define EFI_IFR_FORM_SET_OP 0x0E
#define EFI_IFR_REF_OP 0x0F
#define EFI_IFR_END_ONE_OF_OP 0x10
#define EFI_IFR_END_OP EFI_IFR_END_ONE_OF_OP
#define EFI_IFR_INCONSISTENT_IF_OP 0x11
#define EFI_IFR_EQ_ID_VAL_OP 0x12
#define EFI_IFR_EQ_ID_ID_OP 0x13
#define EFI_IFR_EQ_ID_LIST_OP 0x14
#define EFI_IFR_AND_OP 0x15
#define EFI_IFR_OR_OP 0x16
#define EFI_IFR_NOT_OP 0x17
#define EFI_IFR_END_IF_OP 0x18
#define EFI_IFR_GRAYOUT_IF_OP 0x19
#define EFI_IFR_DATE_OP 0x1A
#define EFI_IFR_TIME_OP 0x1B
#define EFI_IFR_STRING_OP 0x1C
#define EFI_IFR_LABEL_OP 0x1D
#define EFI_IFR_SAVE_DEFAULTS_OP 0x1E
#define EFI_IFR_RESTORE_DEFAULTS_OP 0x1F
#define EFI_IFR_BANNER_OP 0x20
#define EFI_IFR_INVENTORY_OP 0x21
#define EFI_IFR_EQ_VAR_VAL_OP 0x22
#define EFI_IFR_ORDERED_LIST_OP 0x23
#define EFI_IFR_VARSTORE_OP 0x24
#define EFI_IFR_VARSTORE_SELECT_OP 0x25
#define EFI_IFR_VARSTORE_SELECT_PAIR_OP 0x26
#define EFI_IFR_TRUE_OP 0x27
#define EFI_IFR_FALSE_OP 0x28
#define EFI_IFR_GT_OP 0x29
#define EFI_IFR_GE_OP 0x2A
#define EFI_IFR_OEM_DEFINED_OP 0x2B
#define EFI_IFR_LAST_OPCODE EFI_IFR_OEM_DEFINED_OP
#define EFI_IFR_OEM_OP 0xFE
#define EFI_IFR_NV_ACCESS_COMMAND 0xFF
My setup utilitys first opcode is 0x01 which happens to be EFI_IFR_FORM_OP. This creates a form in the current form set.Everything after the first two bytes of an instruction is unique to the specific opcodes structure. So well have to looks at its data structure to find out more. Here it is so you can better understand what Im saying:
struct EFI_IFR_OP_HEADER {
uint32_t Offset;
uint8_t Opcode;
uint8_t Length;
};
struct EFI_IFR_FORM {
EFI_IFR_OP_HEADER Header;
uint16_t FormId;
uint16_t FormTitle;
};
Now that weve established how EFIs HII IFR protocol works, we can create a program to make disassembling it easier. If your more curious about how this protocol works, then feel free to take a look at my programs source code. I commented it thoroughly and its very easy to follow. You can get the latest version of both the program and its source in this post. This program takes the setup utilitys module as a parameter via the use of command line arguments. So the easiest way to run it is to just drag and drop the setup utilitys module onto the EFI IFR Dumper.exe program. This will create an output file which contains all your setups dumped information. Heres what part of my outputted file looks like:For ease of use, I made it show both the instruction and its offset. Now we can easily see everything thats hiding. The two ways that this protocol can restrict access to certain settings are to use the either the EFI_IFR_GRAYOUT_IF_OP or the EFI_IFR_SUPPRESS_IF_OP instructions. If the statement following either of these instructions is evaluated as true, then their restrictions take affect. All the instructions that aid in these conditional restrictions are as follows:
#define EFI_IFR_EQ_ID_VAL_OP 0x12
#define EFI_IFR_EQ_ID_ID_OP 0x13
#define EFI_IFR_EQ_ID_LIST_OP 0x14
#define EFI_IFR_AND_OP 0x15
#define EFI_IFR_OR_OP 0x16
#define EFI_IFR_NOT_OP 0x17
#define EFI_IFR_EQ_VAR_VAL_OP 0x22
#define EFI_IFR_TRUE_OP 0x27
#define EFI_IFR_FALSE_OP 0x28
So you can easily locate all of the things hiding in your setup by looking through the output file for instances of Grayout and Suppress.Lets try to enable the UEFI Boot setting which is currently not visible because of a suppress if instruction. First lets go back to Andys tool, open our BIOS rom, and press the Advanced button. We want to enable the ability to make modifications to the modules. So these are the settings I changed. I also checked No SLIC because otherwise we would have to select a SLIC table in order to repack our changes. Im fine with my BIOS current SLIC table.
Press Done to get back to the main screen of Andys tool. Then press the Go button. When this message comes up, dont press Ok yet. We need to modify our setup module first.
Lets look at the UEFI Boot situation a little more closely.
So everything between the Suppress if and End if isnt being displayed because the conditional statement after the suppress if instruction is being evaluated as true. If we can make this statement evaluate to false, then this setting will appear. Lets look at those offsets in the setup module with a hex editor to see the instructions more closely.
So to make this alteration, we have to replace the EFI_IFR_TRUE_OP with an EFI_IFR_FALSE_OP. This will make the statement right after the EFI_IFR_SUPPRESS_IF_OP evaluate to false. So lets just change 0x27 to 0x28.
Save the file. If you want to verify if this worked then you can run the EFI IFR Dumper.exe program on the newly modified setup module. Heres the changes it shows after the modification:
Its looking good! Time to try it out. Now you can press Ok on the message from Andys tool, and it should repack your BIOS with your modified SetupUtility module. Lets try it out. Rename Andys tools outputted file, mines named 01448F29_SLIC.bin, to what the original rom was called, mines 01448F29.bin. Thisll replace the original rom with the modified one. Now run InsydeFlash.exe. Press Start, wait for it to initialize, then press Ok. It will now flash your computer with you modified BIOS then restart. Upon startup, press the key that corresponds to your setup utility, mines F10, to view your changes. Heres mine:
Awesome! It worked! Now lets go over how to unlock a setting thats suppressed in a more complicated way. So get Andys tool back to the point where youre ready to modify the setup utility module. My Display Mode setting, which can be used to disable hybrid graphics support, is suppressed by two conditional statements with an or condition relating them.
So to have the IFR not hide this setting, well have to modify this entire condition. Lets take a look at those offsets to see what the actual code looks like:
Remember how I said the second byte of any instruction is the length of that instruction. The entire length of the condition is important because were going to replace it all with an EFI_IFR_FALSE_OP. This will make the condition evaluate to false, thus removing the suppression on the setting. So heres how to do that:
Now the statement immediately following the suppress instruction is a false statement. Weve made this false operation the entire length of the original condition so that the IFR will understand that the next instruction takes place 0x10 bytes after the false instruction. I filled in the remaining bytes of it with 0x00 just to make it look nicer. Lets run this new setup module through EFI IFR Dumper to see if all the changes we made were correct.
It looks as expected. So lets apply this change to the BIOS with Andys tool. Now flash it and check out your results.
Double awesome!! Now we have an easy way to gain full access to every option in our setup utility.
Available link for download
Infnity Cdma Tool Ver1 60 New Version Setup Free Download Here
Infnity Cdma Tool Ver1 60 New Version Setup Free Download Here
21-07-2011: CDMA-Tool v1.60 released
.ZTE-AC8720 (modem) model operations improved
.ZTE-S1602 flashing supported
The most easy to use software that you can find.
One button click and phone done.
As ordinary, non-stop free (no any additional payments required) updates during last 6 years, as nobody else...
Infinity-Box 6 (six) years non-stop free updates and support: Infinity-Box - News
- World biggest flash files database for several thousands brands/models
- Infinity-Box Variants & Packages
- BB5 Easy Service Tool [BEST] Dongle
- PinFinder: automatic pinout detection device
Available link for download
Download latest Android Lollipop 5 1 stock firmware for Zopo Speed 7 Plus smartphone
Download latest Android Lollipop 5 1 stock firmware for Zopo Speed 7 Plus smartphone
Firmware details
Archive? Zopo SPEED 7 PLUS Android 5.1 20151228-100600
Firmware: Android Lollipop 5.1 stock
Image: S5570C 20151228-101102 lp1 / MP_mt6753_n325bh_s5570bs_zwx_cc_128gbitp24d3_lp1_lte_3m-fdd-cs_mul_20151228-101102_yucheng_PC
Image file size: 911 MB
Project: n325bh
Config_version: V1.1.2
Inside archive: firmware + MultiDownloadTool_V1528 + Speed7-Plus-User-Guide.pdf
Build number: 20151228-100600
Changelog
Made it compatible with the HI551 front camera.
Increased the snap-shot function using three-finger swiping down.
Available link for download
Thursday, 29 September 2016
Firmware
Firmware
from xda-developers http://ift.tt/2aDPae4
via IFTTT
Available link for download
Retla vs Retail
Retla vs Retail
Anyone with retla rom has tried this shift?
from xda-developers http://ift.tt/29XB1ru
via IFTTT
Available link for download
How to Check or Know if your Windows 8 7 Xp is activated permanently or not
How to Check or Know if your Windows 8 7 Xp is activated permanently or not
How to Check or Know if your Windows 8/7/Xp is activated permanently or not?
- Go to start menu and type cmd and hit enter or press Win+R button and then type cmd.
- After opening command prompt type following command.
- After typing above command you will get a dialog box withing 5 seconds, saying "The machine is permanently activated".
Available link for download
Kenxida Metro 1001 Flash File
Kenxida Metro 1001 Flash File
Available link for download
Floating Toucher Pro v2 4 1 Apk Full App
Floating Toucher Pro v2 4 1 Apk Full App
Requirements: 2.3 and up
Overview: Floating Toucher is specially designed for Android. Floating Toucher is a button floats on your screen over other apps, and you can move it anywhere.
Floating Toucher contains most commonly used switches of Android system and all installed apps, you could control your device or open your favor app easily without exiting current app.
Besides that, you can make it unique by:
1. Customizing the panel functions, pick your most commonly used switches or favor apps
2. Creating folder for apps or switches
3. Changing the floating button style, or DIY your own button.
4. Changing the panels color, or customize your own color.
5. Set the black list to auto hide the point.
6. Customize the click action of point.
Features list:
1. Clear memory
2. Back/Home button(Need ROOT)
3. Favor apps
4. Recent apps
5. System switches
-Screen brightness
-Ring mode
-Bluetooth
-Wifi
-GPS
-APN(Mobile network)
-Rotation
-Flashlight
-Airplan mode
-WIFI hotspot
FAQ:
Why I cannot uninstall Floating Toucher?
The Lock screen feature requires activating device administrator, you have to deactivate it in security settings before installing.
There are two ways to uninstall it:
1. Open floating touch, go to settings page, find the Uninstall option. (Recommend)
2. First, go to System settings -> Security settings -> Device administrators deactivate Floating Toucher, then uninstall Floating Toucher in a normal way.
If youd like to translate the app into your own language, please let us know!
If there is any problem or feedback, please let us know!
Our Email: [email protected]
Whats New
V2.4.1 update:
1. Fix force closed bug on some devices.
https://play.google.com/store/apps/details?id=com.boatmob.floating.touch
Download zippyshare
Available link for download
¿HTC One Google Edition sera posible
¿HTC One Google Edition sera posible
Available link for download
La Gazzetta dello Sport Du 24 Juillet 2016 S 0 L 1
La Gazzetta dello Sport Du 24 Juillet 2016 S 0 L 1
Categorie: Presse
Taille de lupload: 12.77 MB
Status: 0 seeders et 1 leecher
Ajouté le: 2016-07-24 06:09:18
from Torrent411 Torrent Tracker - RSS Feed http://ift.tt/2ajCk6Y
via IFTTT
Available link for download
DOWLOAD SONY XPERIA SMART PHONES STOCK ROMS
DOWLOAD SONY XPERIA SMART PHONES STOCK ROMS
To flash all this rom you will need to us a tool called Flashtools.
Learn how to use Flashtools from here
Download Sony Xperia Z3 Dual D6633 Stock Rom here
Available link for download
Wednesday, 28 September 2016
KKC ALL IN ONE TOOL V1 0
KKC ALL IN ONE TOOL V1 0
Available link for download
DOWNLOAD SAMSUNG GALAXY NOTE ROMS
DOWNLOAD SAMSUNG GALAXY NOTE ROMS
Available link for download
5 STAR RX1 SPD7731 FLASH FILE
5 STAR RX1 SPD7731 FLASH FILE
USE ONLY CM2
Available link for download