USBest · скачать. 0x54 Firmware version mismatch with controller type. Flash Drive Information Extractor v.7.5 выдал. Flash ID Code: ECD798CA — Samsung — 1CE/Single Channel [TLC] -> Total Capacity = 4GB. Новая версия 2.0 программы доступна для скачивания. Воспользовавшись программой Flash Drive Information Extractor v.2.0 от Disker-а пришёл ответ, где ключевой Memory Model = Samsung K9LAG08U0A/B. Написал однажды мне друг с ноутбуком Samsung r60. Процессор в этом Для этого воспользуемся Samsung's FW Modules Extractor. Флешь определилась как Samsung K9ACGD8U0M-4, хотя. версия Flash Drive Information Extractor правильно определила название контроллера Alcor.
Extracting the ES-series firmware. Extracting the ES-series Firmware. Here we will show you how to extract an official Samsung stock firmware for your ES-model, based on the MStar processor found in most of these models. The best way to illustrate how this is done, is by providing a working example, for a particular model. Then you just have to determine your model and download the appropriate firmware (FW) for your TV set. In our case we have a European ES5700 running the T-MST10PDEUC firmware.
Notebook Samsung NP300E5S-S0KRU Нужен дамп биоса сайта биос и распаковываешь с помощю программы Samsung FW Extractor.
So we will take it from there. However, there are some tool requirements that you need satisfy before proceeding. For example, you need a working Python installation, some standard file extraction utilities, in addition to downloading the correct firmware. Here is the extraction procedure:.
Install Python. Install PyCrypto. Download latest SamyGO patcher script from svn.
Extract your firmware. Decrypt it (just example). Uncompress exe. img with 7zip and extract exeDSP or any other file you want. Or mount image file as a loop device under linux. Example extraction for:.
1. Installing Python (on Windows). If you already have a previous installation of Python in Cygwin (like any descent hacker should have), all you have to do is installing the PyCrypt modules. Just fire up your latest Cygwin "setup. exe", and in the "Python" category you'll find the "python-crypto" package. (2. 6-1 at this writing).
Select and continue installation to finish. 3. Downloading " SamyGO ". The SamyGo script is also known as the "SamyGO Firmware Patcher" script. This is what you need to download. Be sure to get the latest build possible.
The script (always updated and recent) can be found on svn:. Navigate to patcher/trunk/.
click on SamyGO Firmware Patcher. py and press "Download this file" at the top.
Rename script to "SamyGO. py", if needed.
4. Extract your firmware. Of course you have already downloaded your firmware, so you need to decompress the firmware. The firmware is usually delivered as a Windows executable file. If you use 7-zip, it will automatically extract the files into a sub-directory. For example, extracting:.
Will result in a subdirectory structure as:. containing the files:. You need to be working in the "T-MST10PDEUC_1029. 0" directory, and copy the SamyGo.
py script there, unless it's already in your PATH. 5. Decrypting with SamyGO. py. The result of this operation is that we get a number of new files:.
The files without the ". enc" (encrypted) extension can then be extracted or mounted, again to see all individual files. Now you can open any of the resulting disk image files:. Here uImage is the "VDLinux" based kernel image. The exeDSP is contained in the exe. img.
which can be either expanded with 7-zip or mounted as a loop image by the standard "mount" Linux utility. However, if you're using Windows you'll need to first extract the above disk image. You can only extract since there is no reliable Windows utility which can mount a disk image with Read & Write. (Cygwin does not support "loop" devices as shown above. ) The recommended one to use is DiskInternal s Linux Reader. Download and install this.
<< This WIP and may need some more editing. >>.