
Derniers tests et previews


PREVIEW Turok: Origins, nous avons testé la chasse aux dinosaures en version coop

PREVIEW Clive Barker’s Hellraiser: Revival, dans l’enfer de la démo la plus dérangeante de la gamescom 2025

PREVIEW Resident Evil Requiem : nos impressions sur la démo jouable du nouveau survival horror de Capcom

PREVIEW Onimusha: Way of the Sword, le retour d’une légende entre ombre et lumière
Dernières actualités

State of Play : PlayStation annonce une nouvelle présentation, dédiée à un seul jeu

LEGO Pokémon : ce set risque de vous ruiner

Meilleures ventes de jeux vidéo en France (semaine 33) : Mario Kart World est le roi, mais Mafia 4 tient bon

Stardew Valley : ce n'est pas terminé, les fans sont aux anges !

failed
Qu'est ce que ça veut dire ?
X360 USB PRO
Pour rappel, Sammy Unlock se trouve dans MKT Flash et j'ai "Vendor Intro Failed" quand je clik dessus et dans intro device ID, j'ai que des longs point qui ne font que s'enchainer
merci !
edit : j ai essayer avec superoneclick et ca a marcher nickel ! voila si ca peut en aider quelque uns !
Loading firmware file C:\...\dummy.bin
MD5 hash: c4b5f6d489e7d2339703c3d09694530c
Parse Failed !
EDIT : j'ai fait une mise à jour du xkey vers 1.20B1 et aussi impréssionnant que cela puisse paraitre, j'ai franchi l'erreur E64 ! Problème résolu donc
Merci énormément à tous je désespérais sincèrement !
et Voilà le log de jungleflasher aprés le flash
Session Started Wed Sep 05 19:10:42 2012
This is a 32 bit process running on 2 x 32 bit CPUs
portio32.sys Driver Installed
portio32.sys Driver Started, thanks Schtrom !
Found 8 I/O Ports.
Found 1 Com Ports.
Found 6 windows drives A: C: D: E: F: H:
Found 2 CD/DVD drives E: F:
Drive is Lite-On..
Sending Vendor Intro to port 0xC400
Status 0x51
Re-sending Vendor Intro:
.
Serial flash found with Status 0x52
Extracted drive key passed Verification !
key returned: ******************************
Key data saved to C:\Documents and Settings\Ghanmy\Bureau\origin dump\Key.bin
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S
0020: 30 32 35 31 30 43 41 30 - 41 30 44 36 30 38 43 47 02510CA0A0D608CG
0030: 37 33 38 38 30 38 30 30 - 33 34 38 20 20 20 00 00 73880800348 ..
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
Inquiry String saved to C:\Documents and Settings\Ghanmy\Bureau\origin dump\Inquiry.bin
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S
0020: 30 32 35 31 30 43 20 20 - 00 00 00 00 00 00 00 00 02510C ........
0030: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0010: 00 00 00 00 44 36 30 38 - 43 47 37 33 38 38 30 38 ....D608CG738808
0020: 30 30 33 34 38 20 20 20 - 00 00 00 00 00 00 32 30 00348 ......20
0030: 31 35 43 30 20 20 4C 50 - 53 44 20 20 20 20 47 44 15C0 LPSD GD
0040: 31 2D 44 36 53 32 20 20 - 20 20 20 20 20 20 20 20 1-D6S2
0050: 20 20 20 20 20 20 20 20 - 20 20 20 20 20 20 00 00 ..
0060: 00 00 00 0B 00 00 00 04 - 00 02 06 00 00 00 00 00 ................
0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0080: 03 00 78 00 78 00 E3 00 - 78 00 00 00 00 00 00 00 ..x.x...x.......
0090: 00 00 00 00 00 00 00 00 - 02 02 00 00 68 00 40 00 ............h.@.
00A0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00B0: 20 20 00 00 ..
Identify String saved to C:\Documents and Settings\Ghanmy\Bureau\origin dump\Identify.bin
0000: 44 36 30 38 43 47 37 33 - 38 38 30 38 30 30 33 34 D608CG7388080034
0010: 38 20 20 20 FF FF FF FF - FF FF FF FF FF FF FF FF 8 ............
0020: FF FF FF FF FF FF FF FF - 41 30 FF FF FF FF FF FF ........A0......
0030: FF FF FF FF FF FF FF FF - FF FF FF FF FF FF FF FF ................
0040: FF FF FF FF FF FF FF FF - FF FF FF FF 41 30 FF FF ............A0..
Serial String saved to C:\Documents and Settings\Ghanmy\Bureau\origin dump\Serial.bin
Dummy.bin file saved to Dummy.bin
Loading firmware from buffer
Inquiry string found
Identify string found
Drive key @ 0xA030 ***************************
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: PhatKey Extract
Key added to database
Drive is Lite-On..
Key found in KeyDB at record (1 - origin dump)
Key is: **********************************
Key has been tested and verified, thanks C4eva !
Sending Vendor Intro to port 0xC400
Status 0x51
Re-sending Vendor Intro:
.
Serial flash found with Status 0x52
Stage 1 failed
Stage 1 failed
Extracted drive key failed Verification !
PhatKey extraction failed!
Drive is Lite-On..
Key found in KeyDB at record (1 - origin dump)
Key is: ***********************************
Key has been tested and verified, thanks C4eva !
Sending Vendor Intro to port 0xC400
Status 0x51
Re-sending Vendor Intro:
.
Serial flash found with Status 0x52
Extracted drive key passed Verification !
key returned: *****************************
Key data saved to C:\Documents and Settings\Ghanmy\Bureau\origin dump\2nd\Key.bin
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S
0020: 30 32 35 31 30 43 41 30 - 41 30 44 36 30 38 43 47 02510CA0A0D608CG
0030: 37 33 38 38 30 38 30 30 - 33 34 38 20 20 20 00 00 73880800348 ..
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
Inquiry String saved to C:\Documents and Settings\Ghanmy\Bureau\origin dump\2nd\Inquiry.bin
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S
0020: 30 32 35 31 30 43 20 20 - 00 00 00 00 00 00 00 00 02510C ........
0030: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0010: 00 00 00 00 44 36 30 38 - 43 47 37 33 38 38 30 38 ....D608CG738808
0020: 30 30 33 34 38 20 20 20 - 00 00 00 00 00 00 32 30 00348 ......20
0030: 31 35 43 30 20 20 4C 50 - 53 44 20 20 20 20 47 44 15C0 LPSD GD
0040: 31 2D 44 36 53 32 20 20 - 20 20 20 20 20 20 20 20 1-D6S2
0050: 20 20 20 20 20 20 20 20 - 20 20 20 20 20 20 00 00 ..
0060: 00 00 00 0B 00 00 00 04 - 00 02 06 00 00 00 00 00 ................
0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0080: 03 00 78 00 78 00 E3 00 - 78 00 00 00 00 00 00 00 ..x.x...x.......
0090: 00 00 00 00 00 00 00 00 - 02 02 00 00 68 00 40 00 ............h.@.
00A0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00B0: 20 20 00 00 ..
Identify String saved to C:\Documents and Settings\Ghanmy\Bureau\origin dump\2nd\Identify.bin
0000: 44 36 30 38 43 47 37 33 - 38 38 30 38 30 30 33 34 D608CG7388080034
0010: 38 20 20 20 FF FF FF FF - FF FF FF FF FF FF FF FF 8 ............
0020: FF FF FF FF FF FF FF FF - 41 30 FF FF FF FF FF FF ........A0......
0030: FF FF FF FF FF FF FF FF - FF FF FF FF FF FF FF FF ................
0040: FF FF FF FF FF FF FF FF - FF FF FF FF 41 30 FF FF ............A0..
Serial String saved to C:\Documents and Settings\Ghanmy\Bureau\origin dump\2nd\Serial.bin
Dummy.bin file saved to Dummy.bin
Loading firmware from buffer
Inquiry string found
Identify string found
Drive key @ 0xA030 ********************************
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: PhatKey Extract
Key database updated
Loading firmware file C:\Documents and Settings\Ghanmy\Bureau\jungleflasher-0-1-92-304_1326675617\firmware\LTPlus-0251-v3.0.bin
MD5 hash: d14fe82b96741b7a18e5c1e7adbf0a98
Genuine LT plus v3.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: LT-Plus 3.0
Spoofing Target
DVD Key copied to target
Target is LT - ID strings not copied to Target
Serial data already matches
Target rev is LT 02510C, serial info not copied
Target f/w saved as: Lite_CFW.bin
Sending Lite-On-Erase request to port 0xC400
..............
Drive returned Status 0xD0
....................
Device Intro failed!
Lite-On-Erase NOT sent
Sending Lite-On-Erase request to port 0xC400
..............
Drive returned Status 0x80
...........
Serial flash found with Status 0x72
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Getting Status from port 0xC400
SPi flash found with Status 0x72
Sending Chip Erase to Port 0xC400
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Write verified OK !
Sending Vendor Outro to port 0xC400
Drive is Lite-On..
Key found in KeyDB at record (1 - 2nd)
Key is: ********************************
Key has been tested and verified, thanks C4eva !
y-a-t-il un probléme que j'ai manqué?
Merci pour le tuto, mais j'ai un soucis car mo galaxy note n7000 ne veu pas se rooter -_-.
adroid version 2.3.6
unlock root version 2.4.2
en fait j'ai 2 problemes :
-le premier c'est que unlock root 2.4.2 telecharge les fichier, mais reste bloqué a 100% et plus rien ne se passe.
- le deusieme, quand ca bloque au 100%, je debranche et rebranche mon note (l'usb) et la au bout de quelques minutes j'ai ce fameux message d'erreur "failed to get shell root".
Donc si un ame charitable pouvais m'aider, car la je bug ...
alors j'ai changé de port sata et ça n'y change rien j'ai donc installé windows 7 en 32 bits sur un autre disque dur et la miracle ça fonctionne ! il me détecte ç :
venor : PLDS
name : DG-16D4S
F/W rev : 0272
reserved A0a0
dvd key : verified (avec la clé à côtée)
et lorsque je fais slim unlock il me dit "slim-un-lock command returned an error" je fais donc ok et il me dit "unlock failed !"...
Voici une image de mon winbond.
Uploaded with ImageShack.us
Oui re-télécharge le Zip de la Rom et reflash