ADVERTISEMENT

x65flasher-2103.zip

Siemens - Zbiór poradników

Flashowanie Siemensa programem x65 flasher Aby wgrać Full Flasha do naszej słuchawki musimy wprowadzić skeya do telefonu. Jest jeszcze druga możliwość czyli wykonujemy TP (testpoint) Jak już mamy wgranego skeya do telefonu, to zapisujemy sobie do notatnika wszystkie kody z programu Papua UtilsV111c. Pobieramy i uruchamiamy program x65Flasher. Każdy wybiera swój port com i resztę ustawiamy tak jak na screenie, klikamy connect. Jeśli ktoś robi poprzez tp to zamiast open wit skey wybiera testpoint. Jeśli mamy dobry kabel to wybieramy prędkość największą jeśli mamy kiepski przewód do naszego telefonu lub jest pod port com wybieramy prędkość 115200. https://obrazki.elektroda.pl/5637487100_1528570514_thumb.jpeg Na komunikat jak na screenie wciskamy power w telefonie czyli zazwyczaj czerwoną słuchawkę. https://obrazki.elektroda.pl/9982957900_1528570536_thumb.jpeg Gdy telefon zostanie wykryty klikamy wirate flash. https://obrazki.elektroda.pl/1190688900_1528570563_thumb.jpeg Teraz wybieramy plik z flashem do naszego telefonu i klikamy otwórz. https://obrazki.elektroda.pl/4702045100_1528570585_thumb.jpeg Na komunikat jak na screenie klikamy ok i czekamy aż program skończy prace. https://obrazki.elektroda.pl/8459825400_1528570610_thumb.jpeg Gotowe, możemy włączyć nasz telefon pod warunkiem, że wgrywaliśmy kopię swojego oryginalnego softa. Jeśli wgrywaliśmy obcego Full Flasha, to musimy jeszcze naprawić IMEI.


Download file - link to post
  • x65flasher-2103.zip
    • DownloadHistory.txt
    • messages
      • 1049.txt
      • 1033.txt
    • MPMSetup.log
    • V_Klay
      • x65.vkd
      • x75.vkd
    • documentation
      • readme-en.html
      • readme-ru.html
      • history.txt
    • x65flasher_list.bat
    • x65flasher.exe
    • px75v1
      • px75v1.jad
      • px75v1.jar
    • x65flasher_restore.bat
    • config.ini
    • bsReader
      • bsReader.jar
      • bsReader.jad


x65flasher-2103.zip > history.txt

1.027 - initial public release;
1.030 - fixed bug with connection losts on win98/ME;
added communication logging (/L switch);
1.035 - added support for AMD/Fujitsu flash types;
many bugfixes
1.050 - added boot method using boot password generation;
enabled write to EEFULL
1.054 - more reliable work in safe mode;
faster search of boot password
1.055 - fixed boot with several bootkeys;
information for boot password can be read with turned on phone;
added boot method " restore broken bootcore "
1.060 - new features: " format filesystem " and " change phone model "
1.071 - new method of boot password generation with midlet
1.072 - allows manual entry of ESN and HASH
1.091 - support for S75/SL75;
now you can enter description of the phone instead of IMEI;
removed old boot methods;
1.092 - fixed loader for 65 series, added generic loaders for V-klay
1.094 - support for new AMD flash type
2.101 - now you can enter or remove SKEY using flasher;
added support for x85 series (S68,EL71,C81...);
support for full 96-megabyte SL75 flash;
testpoint boot, reading ESN and HASH with testpoint;
working with flash images instead of real devices;
restore part of flash (filesystem, eeprom...) from fullflash backup;
during restore, if " force " flag not set, only modified blocks are written;
localization: all messages now placed in separate files
2.102 - added support for intel M18 flash type
2.103 - added support for ST flash types;
fixed bugs in localization;
after calculation of the keys, flasher writes all keys to phones.log


x65flasher-2103.zip > 1049.txt

Russian
Ôàéë
Òåëåôîí ñ ââåäåííûì SKEY
Òåñòïîèíò
Ïîäêëþ÷èòü
Îòêëþ÷èòü
Îòêðûòü ôàéë
Çàêðûòü ôàéë
Âíèìàíèå
Îøèáêà
Îòìåíà
Êîäû ...
Áýêàï
Âîññòàíîâëåíèå
Advanced
Ðàñ÷åò SKEY è BOOTKEY
Ââåñòè SKEY â òåëåôîí
Óáðàòü SKEY èç òåëåôîíà
Óäàëèòü ýòîò êëþ÷
Óäàëèòü êëþ÷ èç ñïèñêà?
Ïðîñìîòð êàðòû ôëýø-ïàìÿòè
Ôîðìàòèðîâàíèå ÔÑ
Èçìåíèòü ìîäåëü òåëåôîíà
Àäðåñ
Äëèíà
×òåíèå ôëýø
Çàïèñü ôëýø
Êàðòà ôëýø-ïàìÿòè
Ðàñ÷åò áóò-êëþ÷à
Äëÿ ðàñ÷åòà êëþ÷åé âàì íóæíû 2 ÷èñëà: HASH è ESN.\nÂû ìîæåòå óçíàòü èõ ñ ïîìîùüþ ìèäëåòà bsReader èëè òåñòïîèíòà.
Òèï òåëåôîíà
Îïèñàíèå
-- Âûáåðèòå --
SGold (x65, x70, C75, CX75, M75, ME75)
NewSGold (S75, SL75, S68, EL71, C71)
Èçìåíåíèå ìîäåëè
Âíèìàíèå, ýòà îïåðàöèÿ\nèçìåíÿåò îáëàñòü bootcore!
Ìîäåëü:
×òî âû õîòèòå âîññòàíîâèòü èç ýòîãî áýêàïà?
Âåñü ôëýø
Ïèñàòü íåèçìåíåííûå áëîêè
Ââîä SKEY
Âíèìàòåëüíî ïðîâåðüòå ââîäèìîå çíà÷åíèå!\nÊîëè÷åñòâî ïîïûòîê ââîäà SKEY îãðàíè÷åíî!
Çàìêíèòå òåñòïîèíò è íàæìèòå êðàñíóþ êíîïêó
Ïîèñê...
Ïîèñê... ïîæàëóéñòà âûêëþ÷èòå òåëåôîí
Ïîèñê... (íàæìèòå êðàñíóþ êíîïêó)
Çàãðóçêà ëîàäåðà...
×òåíèå èíôîðìàöèè î òåëåôîíå...
×òåíèå êàðòû ïàìÿòè...
×òåíèå...
Çàïèñü...
Ðàñ÷åò êëþ÷åé...
Ïðîïóñêàþ bootcore
Ïðîïóñêàþ çàùèùåííóþ îáëàñòü
Ââîä SKEY...
Óäàëåíèå SKEY...
Skey ââåäåí.
Skey óäàëåí.
Ôîðìàòèðîâàíèå
Ôîðìàòèðîâàíèå çàâåðøåíî
Âñå äàííûå íà äèñêå A: òåëåôîíà áóäóò ïîòåðÿíû!\nÂû äåéñòâèòåëüíî õîòèòå ïðîäîëæèòü?
ÂÀÆÍÎ: êîãäà âû âêëþ÷èòå òåëåôîí, â òå÷åíèå 3-5 ìèíóò\náóäåò ïðîèñõîäèòü èíèöèàëèçàöèÿ ôàéëîâîé ñèñòåìû. Ïîæàëóéñòà,\näîæäèòåñü îêîí÷àíèÿ ýòîãî ïðîöåññà.
Âíèìàíèå: áóòêîð áóäåò ïðîïóùåí
Çàïèñàòü â ôëýø ôàéë
Çàïèñü ôëýø
Àäðåñ
äëèíà
Êëþ÷è ðàññ÷èòàíû!
Ëîàäåð äëÿ V_Klay ñîõðàí¸í â ôàéë
Success
Òåïåðü îòêëþ÷èòå òåñòïîèíò
ñåê
Ñáîåâ
áýêàï
Âîññòàíîâèòü
èç ôàéëà
Ñâÿçü ñ òåëåôîíîì ïîòåðÿíà
Íå ìîãó îòêðûòü ôàéë
Îøèáêà ÷òåíèÿ ôàéëà
Íå ìîãó îòêðûòü ïîðò
Ôàéë ñëèøêîì ìàëåíüêèé
Íåâåðíûé ðàçìåð ôëýø ôàéëà
Íåèçâåñòíûé òèï áóòêîðà.\nÍåêîòîðûå ôóíêöèè áóäóòò íåäîñòóïíû
Ïîðò íå ïîääåðæèâàåò ýòó ñêîðîñòü
Íåò îòâåòà îò ëîàäåðà (êëþ÷ íå ïðèíÿò).\nÂîçìîæíî, âû âûáðàëè íå òîò òåëåôîí â ìåíþ.\nÅñëè âû ïîäêëþ÷àåòå òåëåôîí âïåðâûå, âàì íóæíî ðàññ÷èòàòü\nêëþ÷è ñ ïîìîùüþ ìèäëåòà bsReader èëè òåñòïîèíòà.
Íåò îòâåòà îò ëîàäåðà.\nÒåëåôîí íå ïîääåðæèâàåòñÿ, èëè âîçíèêëà àïïàðàòíàÿ îøèáêà.
Íåò îòâåòà îò ñåðâèñíîãî çàãðóç÷èêà
Èçìåíåíèå ñêîðîñòè íå ðåàëèçîâàíî
Íåâîçìîæíî óñòàíîâèòü ñîåäèíåíèå íà ýòîé ñêîðîñòè\n(ñêîðîñòü ñëèøêîì âûñîêàÿ)
Íå ìîãó ïðî÷èòàòü èíôîðìàöèþ î òåëåôîíå
Îøèáêà CRC
Òàéìàóò
Âíóòðåííÿÿ îøèáêà
Îøèáêà îïåðàöèè ïîèñêà
Îøèáêà ÷òåíèÿ ôàéëà
Îøèáêà çàïèñè ôàéëà
Çàïðîñ íà çàïèñü ôëýø ïðåðâàí
Çàïèñü íå çàâåðøåíà (òàéìàóò)
Îøèáêà ñòèðàíèÿ ôëýø-ïàìÿòè
Îøèáêà çàïèñè ôëýø-ïàìÿòè
Îøèáêà êîíòðîëüíîé ñóììû ôëýø
Ñëèøêîì ìíîãî ôðàãìåíòîâ
Ñëèøêîì ìíîãî áëîêîâ ÔÑ
Áëîêè ýòîãî òèïà íå íàéäåíû
Ýòèì ñïîñîáîì âû ìîæåòå âîññòàíîâèòü òîëüêî FBK-áýêàï èëè ïîëíûé îáðàç ôëýøà.\n×òîáû âîññòàíîâèòü ôðàãìåíò ôëýøà, èñïîëüçóéòå " Çàïèñü ôëýø " .
Ýòîò ôàéë - íå áýêàï ôëýøà
Ðàçìåð ôàéëà áýêàïà îòëè÷àåòñÿ îò ðàçìåðà\nòåêóùåãî ôëýø-ôàéëà! Ïðîäîëæèòü?
ÂÍÈÌÀÍÈÅ!!!\nÐàñïðåäåëåíèå ôëýø-ïàìÿòè òåëåôîíà îòëè÷àåòñÿ îò áýêàïà!\nÂîññòàíîâëåíèå èç ýòîãî áýêàïà ìîæåò óáèòü òåëåôîí!\nÏðîäîëæèòü?
×òîáû âîññòàíîâèòü áóòêîð, çàïóñòèòå ôëåøåð\nñ êëþ÷îì /B.
Ýòîò ôàéë íå ÿâëÿåòñÿ ïîëíûì áýêàïîì ôëåø-ïàìÿòè äëÿ ýòîãî òåëåôîíà
Ôàéë ïîâðåæäåí
Ýòà ôóíêöèÿ ðàáîòàåò òîëüêî ñ ðåàëüíûì òåëåôîíîì
Îøèáêà ââîäà SKEY
Îøèáêà óäàëåíèÿ SKEY
Òåëåôîí íå ïðèíÿë ýòîò êëþ÷.\nÑêîðåå âñåãî, êëþ÷ íåïðàâèëüíûé
Íåèçâåñòíûé ðàçìåð áëîêà
Íåâåðíîå çíà÷åíèå àäðåñà èëè äëèíû
Àäðåñ íàõîäèòñÿ âíå îáëàñòè ôëýø-ïàìÿòè
Àäðåñ ëåæèò íå íà ãðàíèöå áëîêà
Îáëàñòü çàêàí÷èâàåòñÿ íå íà ãðàíèöå áëîêà
×òîáû âîññòàíîâèòü FBK-áýêàï, èñïîëüçóéòå êîìàíäó " Âîññòàíîâëåíèå "
Ðàçìåð ôàéëà ìåíüøå äëèíû âîññòàíàâëèâàåìîãî ôðàãìåíòà
Íå ìîãó ñîçäàòü ëîàäåð äëÿ V_Klay
Íå ìîãó îòêðûòü âðåìåííûé ôàéë
Êëþ÷ íå áûë íàéäåí. Âîçìîæíî, èñïîëüçóåòñÿ íîâûé àëãîðèòì,\nèëè âû ïðîñòî îøèáëèñü ïðè ââîäå Hash/ESN.
Íåèçâåñòíûé òèï ôëýø-ïàìÿòè


x65flasher-2103.zip > readme-en.html

& nbsp;
X65flasher - flasher for Siemens(Benq-Siemens) mobiles



Features

work with a telephone through SKEY, BOOTKEY
or testpoint
reading and writing flash memory of the phone
backup and restore of fullflash or its parts
(filesystem, firmware, EEPROM)
quick restore: only changed blocks are
restored
calculation of phone service codes (SKEY and
BOOTKEY) with midlet or testpoint
entering SKEY into phone and removing it
flash memory map
works at speed from 57600 to 1600000 baud
generation of loaders for V_Klay
working with fullflash image instead of the
real phone
additional features: FFS format, change name
of the phone

Supported phones

Siemens C65, CX65, M65, CX70, C72, C75,
CX75, CF75, M75, ME75, S65, SL65, S75, SL75, SK65, SP65
Benq-Siemens S68, C81, M81
Benq-Siemens* EL71, E71

Probably this list is incomplete. If your
phone
is SGold-based, probably flasher will
work with it. Phones on Benq platform are not supported, and their
support is not planned.
With phones of old series (45,55,60) and
A-series, use Freia and V_Klay. If you have some new phone don't know
whether it's on SGold platform, look at its keyboard - in SGold-based
phones a space character is on the
button 1 (although this, certainly, not 100% sign)

* EL71 with fw 37 and higher and E71 use new key algorithm. For this
time you can work with these phones only through testpoint.

Choice of a cable
Flasher can work with a phone only through
a COM-cable or USB-cable with the USB-to-COM converter. A cable that
goes in the package - DCA-540, it is clean USB-cable, flasher doesn't
work
with it. Most Chinese USB-cables work without problems. A simple test:
cable must be recognized by a computer, even if a phone is not
connected. Also in USB-to-COM cables you can see a small box in the
middle of a cable. In the case
of COM-cable, the power must go from the COM-port (you cannot check
this by look).
Original cables DCA-510, DCA-512 does work;
DCA-500, DCA-540 doesn't.
You cannot work with flasher via IRDA or
bluetooth.

About used terms
Flash - a chip of non-volatile memory. It
contains firmware, bootcore, phone settings, filesystem.

Fullflash - a complete copy of flash memory.
It has 32, 64 or 96 Mbytes size depending on the phone model. If you
have fullflash backup, you can always recover your phone after bad
patches or failures during flashing. Therefore fullflash backup is the
first thing you should do before changing & nbsp; anything in the phone.

Bootcore - initial loader, the most critical
part of the flash. If bootcore is broken, you have to make testpoint to
recover the phone. For this reason, write to bootcore is disabled by
default; to override this, start
flasher with /B switch.

Firmware - the phone's program code.

EEPROM - the individual settings of the phone
(IMEI, boot key, GSM/GPRS settings, battery parameters...) Consists of
two parts - EEFULL and EELITE. It's extremely undesirable to lose
your own EEPROM, although it is possible to recover partially with
PapuaUtils tool.

FFS - phone's file system that is accessible
through MPM and other programs. Consists of three disks: 0: - user
FFS, 1: - cache, 2: - system FFS. Disks 1: and 2: are visible only when
SKEY is entered to phone.

Bootloader - the small program that is sent to
phone by flasher when you're pressing the red button. It implements
reading/writing of flash memory. To get your bootloader working, you
need either BOOTKEY or SKEY of this phone.

SKEY - service key of & nbsp; the phone,
8-digit number. After entering the SKEY to the phone, it is
possible to use any bootloader; it also opens developer manu, access to
disks 1: and 2:, access to protected blocks of EEPROM.

BOOTKEY - bootloadet authentication key, used
for loading arbitrary bootloader into the phone. Unlike SKEY, it is not
kept in the phone, but sent with bootloader.

HASH - unique 16-byte number. It is used for
verification of the keys. Recorded in the bootcore.

ESN - unique serial number. It
is kept in the one-time programmable region of the flash chip; it's
impossible to change it.

Testpoint - a place on the PCB of the phone.
Shorting it to the ground, one will be able to send any bootloader,
without knowing the keys. You have to disassemble your phone to do
this, of course this voids the warranty.

Searching for the boot keys
To make your phone " visible " to the flasher,
you need to know SKEY or BOOTKEY. There are three methods to find them:

1. Using midlet (bsReader or px75v1).
Copy the bsReader midlet to the Applications folder in the phone (for
S75/SL75 and Benq-Siemens phones) or px75v1 to Java\Jam\Applications
(for older models), then launch the midlet from
" Applications " menu. After 5-15 minutes midlet will show HASH and ESN.
Start flasher, choose " Keys " - & gt; " Calculate SKEY and BOOTKEY " , enter
description of the phone, HASH and ESN. The calculation of the key
lasts usually up to 10
minutes. The program also generates loader for V_Klay, copy
it to & lt;path_to_VKlay & gt;\data\loaders. Now choose COM-port, speed
and description of your phone, and press " Connect " .
If you wish, you can enter SKEY to the phone ( " Keys " - & gt; " Enter
SKEY " ).

About bsReader and px75v1: they use a bug in
java, due to which you can directly read phone's memory. Midlet works
not always stable, sometimes hangs up, sometimes generates Exception,
sometimes turns the phone off. If you had not success first time, try
again. Some day the java bug will be fixed. So, if the midlet generated
the same
Exception all the times, probably it was happen. Use methods 2
and 3.

2. If you already know SKEY for your phone, choose
" Keys " - & gt; " Enter SKEY " . After entering the key, flasher
works with the phone without additional actions.

3. If you don't know the key, and midlet doesn't work, the only variant
is testpoint. You can find pictures of the testpoints for many phone
models at
http://allsiemens.com/testpoints. The testpoint have to be shorten to
the ground
through a 10-50 ohm resistor. You can use some metal
thing, but take a big care, because shorting of wrong point on the PCB
can put the phone out of service. Choose the " Testpoint " boot method in
the flasher, press " Connect " , then short the testpoint, push the red
button, then release testpoint in 3 seconds. Now you can choose " Keys "
- & gt;
" Calculate SKEY and BOOTKEY " (HASH and ESN has been already read from
the phone).


Working with flasher





ALWAYS MAKE A FULL
BACKUP OF YOUR FLASH BEFORE DOING ANY CHANGES!!!
FULLY CHARGE THE BATTERY BEFORE WORKING WITH FLASHER.




To work with phone, choose COM port, speed, boot key of
your phone. A serial port with standard drivers supports up to 115200
kbps, for some motherboards you can achieve higher speeds using
HiSerial driver. USB cables support up to 1600000 kbps, the real speed
depends on quality of the cable.
In the list of boot keys, choose a key calculated for your phone. If
you have entered SKEY into the phone, flasher will work with any boot
key.
You can select " File " instead of real COM-port, in this case flasher
will ask you to open fullflash image, it will work with it as with the
real phone (sometimes it might be useful).

Backup: save an image of the flash or its part into a
file with fbk extension. Flasher asks what do you want to backup -
fullflash, bootcore, firmware, filesystem or EEPROM. You don't have to
calculate address and length or memory region, flasher will do it for
you.

Restore: write saved image from fbk file back to the
flash. If you have fullflash image, you can restore only its part (for
example, filesystem). To restore bootcore, start flasher with /B switch.
By default, flasher writes only blocks that have been changed, this
speeds up the restore process in the case of small changes. You can
choose " force write of unchanged blocks " option to override this.

Memory map: show the map of flash blocks in graphical
view. You can compare current map of flash with fullflash image,
flasher will mark changed blocks on the map.

Format FFS: this command formats disk 0: of the phone.
After formatting, turn the phone on and wait a few minutes - the phone
initializes filesystem.

Change phone model: this option can be useful, if you
want to try the firmware from different phone. Use this option with
caution, because it changes bootcore area.

Read flash, write flash: low-level work with flash. You
have to specify address and length of the block. Keep in mind that
flash memory is split into blocks (64k, 128k, or 256k, depends on flash
chip and not always equal to the size of the block that shown in the
flash map). For writing, address and length should be multiply of & nbsp;
block size, reading can be done with any address and length.

Command line options
/L - show communication log
/B - enable writing to the bootcore (use
with caution!)


THE PROGRAM IS PROVIDED " AS IS " , WITHOUT A WARRANTY OF
ANY KIND. IN NO
EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DAMAGE CAUSED BY USE OF THIS
PROGRAM. YOU MAY NOT USE THIS PROGRAM OR ITS PARTS FOR COMMERCIAL
PURPOSES WITHOUT AUTHOR'S PERMISSION.




(c) 2004-2006 by Chaos
Boot password generator (c) by Papuas
thanks to SiNgle, ACiD[mrp], LazyC0DEr, Phantom


x65flasher-2103.zip > 1033.txt

English
File
Open phone (with SKEY)
Testpoint
Connect
Disconnect
Open file
Close file
Warning
Error
Cancel
Keys ...
Backup
Restore
Advanced
Calculate SKEY and BOOTKEY
Enter SKEY into phone
Remove SKEY from phone
Delete this key
Delete key from list?
View flash map
Format FFS
Change phone model
Address
Length
Read Flash
Write Flash
Flash Map
Generate boot key
To calculate boot key, you need two numbers - HASH and ESN.\nYou can find them with bsReader midlet, or using testpoint.
Phone type
Description
-- Choose --
SGold (x65, x70, C75, CX75, M75, ME75)
NewSGold (S75, SL75, S68, EL71, C71)
Change model name
Warning, this operation\noverwrites bootcore area!
New name:
What do you want to restore from this\nbackup?
Whole Flash
Force restore of all blocks
Enter SKEY
Warning! Check carefully the key\nyou're entering! The number of\nattempts to enter key is limited!
Connect testpoint and press red button
Scanning...
Scanning... Please turn the phone off
Scanning... (press red button shortly)
Sending loader...
Reading phone info...
Reading flash map...
Reading...
Writing...
Calculating boot password...
Skipping bootcore
Skipping protected area
Entering SKEY...
Removing SKEY...
Skey entered.
Skey removed.
Format FFS
Format complete
All data on disk A: will be lost!\nDo you really want to continue?
IMPORTANT: when you turn your\nphone on, there will be nothing\non the display for about 3-5\nminutes. This is normal, please\nbe patient and don't try to\nreboot phone.
Note: bootcore will be skipped
Write file
Write flash
Address
length
Boot key retrieved! Now you can work with flasher.
Note: loader for V_Klay is saved to
Success
Now release testpoint
sec
Faults
backup
Restore
from file
Lost connection to mobile
Cannot open file
Error reading file
Cannot open port
File is too small
Wrong fullflash size
Unknown bootcore signature.\nSome functions will not be available
Speed not supported by hardware
No answer from loader (bootkey not accepted).\nCheck whether you've choosed right phone in menu.\nIf this is a new phone, you need to calculate boot key\nusing bsReader midlet or testpoint.
No answer from loader.\nThe phone is not supported, or hardware error occured
No answer from service boot
Speed changing not implemented by loader
Cannot communicate at this speed\n(probably speed is too high)
Cannot get phone info
CRC error
Timeout
Internal error
File seek error
File read error
File write error
Flash request aborted
Write failed (timeout)
Flash erase error
Flash write error
Flash checksum error
Too many pieces
Too many fs blocks
No blocks of this type found
You can only restore FBK backup or binary fullflash image this way.\nTo restore partial binary image, use Write Flash option.
This is not a flash backup file
Size of fullflash backup differs from\ncurrent fullflash file! Continue?
WARNING!!!\nFlash maps of phone differs from backup flash map!\nRestoring from this backup may kill the phone!\nContinue?
To restore bootcore, start flasher\nwith /B switch.
This is not a fullflash backup for this phone
File is corrupted
This function available only for real devices
Error entering SKEY
Cannot remove SKEY
Phone has not accepted this key.\nMaybe key is wrong
Unknown block size
Invalid address or length value
Address in not in flash area
Area begins not on flash block bound
Area ends not on flash block bound
To restore FBK file, please use 'restore' button
File length less than requested
Cannot open V_Klay loader file
Cannot open temporary file
Key was not found. Possibly some new algorithm is used.
Unknown flash type


x65flasher-2103.zip > readme-ru.html

X65flasher - ôëåøåð äëÿ
òåëåôîíîâ Siemens (Benq-Siemens) íà ïëàòôîðìå SGold



Âîçìîæíîñòè

ðàáîòà ñ òåëåôîíîì ÷åðåç SKEY , BOOTKEY èëè òåñòïîèíò
÷òåíèå è çàïèñü flash-ïàìÿòè òåëåôîíà
áýêàï è âîññòàíîâëåíèå êàê âñåãî fullflash ,
òàê è îòäåëüíûõ ÷àñòåé ( ôàéëîâîé ñèñòåìû , ïðîøèâêè , EEPROM )
áûñòðîå âîññòàíîâëåíèå: âîññòàíàâëèâàþòñÿ òîëüêî èçìåí¸ííûå áëîêè
âû÷èñëåíèå êîäîâ òåëåôîíà (SKEY è BOOTKEY) ñ ïîìîùüþ ìèäëåòà èëè òåñòïîèíòà
ââîä SKEY â òåëåôîí è óäàëåíèå åãî
ïðîñìîòð êàðòû flash-ïàìÿòè, âûâîä èçìåíåíèé ïî ñðàâíåíèþ ñ
áýêàïîì
ðàáîòà íà ñêîðîñòè îò 57600 äî 1600000 áèò/ñ
ãåíåðàöèÿ ëîàäåðîâ äëÿ V_Klay
âîçìîæíîñòü ðàáîòû ñ îáðàçîì fullflash âìåñòî ðåàëüíîãî òåëåôîíà
äîïîëíèòåëüíûå ôóíêöèè: ôîðìàòèðîâàíèå FFS, èçìåíåíèå íàçâàíèÿ
ìîäåëè òåëåôîíà



Ïîääåðæèâàåìûå ìîäåëè

Siemens & nbsp;
C65, CX65, M65, CX70, C72, C75, CX75, CF75, M75, ME75, S65, SL65, S75,
SL75, SK65, SP65
Benq-Siemens * & nbsp; S68, C81, M81

Benq-Siemens ** E71, EL71



Âîçìîæíî, ýòî íåïîëíûé ñïèñîê. Åñëè âàø òåëåôîí íà
ïëàòôîðìå SGold,
ñêîðåå âñåãî, ôëåøåð ñ íèì ðàáîòàòü áóäåò. Òåëåôîíû íà ïëàòôîðìå Benq
íå
ïîääåðæèâàþòñÿ, è èõ ïîääåðæêà íå ïëàíèðóåòñÿ. Ñ òåëåôîíàìè ìëàäøèõ
ñåðèé
(45,55,60) è À-ñåðèè ðàáîòàþò òàêèå ïðîãðàììû,
êàê Freia è V_Klay. Åñëè ó âàñ íîâàÿ ìîäåëü òåëåôîíà è âû íå çíàåòå, íà
êàêîé îí ïëàòôîðìå,
ïîñìîòðèòå íà åãî êëàâèàòóðó - â SGold-òåëåôîíàõ ïðîáåë ðàñïîëîæåí íà
êíîïêå 1 (õîòÿ ýòî, êîíå÷íî, íå
100% ïðèçíàê).

* Ïîñêîëüêó çà äâà ìåñÿöà íè îäèí ÷åëîâåê òàê è
íå îòêëèêíóëñÿ íà ìîþ ïðîñüáó äàòü íà òåñòèðîâàíèå êàêîé-íèáóäü èç ýòèõ
òåëåôîíîâ, èõ ïîääåðæêà ðåàëèçîâàíà â ïðîãðàììå, íî íå ïðîâåðåíà. Åñëè
ó âàñ îäèí èç ýòèõ òåëåôîíîâ, à ôëåøåð èëè ìèäëåò ñ íèì íå ðàáîòàåò -
ñîððè, íè÷åì íå ìîãó ïîìî÷ü...
** Íà E71, à òàêæå EL71 ñ ïðîøèâêîé 37 è ñòàðøå èçìåíåí àëãîðèòì
ðàñ÷åòà êëþ÷åé, ïîýòîìó ðàáîòà ñ ýòèìè òåëåôîíàìè ïîêà âîçìîæíà òîëüêî
÷åðåç òåñòïîèíò.



Âûáîð êàáåëÿ

Ôëåøåð ìîæåò ðàáîòàòü ñ òåëåôîíîì òîëüêî ÷åðåç
COM-êàáåëü èëè
USB-êàáåëü ñ USB-to-COM êîíâåðòåðîì.  ñòàíäàðòíîé ïîñòàâêå èä¸ò êàáåëü
DCA-540 - ýòî ÷èñòûé USB-êàáåëü, ñ íèì íè÷åãî íå âûéäåò. Áîëüøèíñòâî
êèòàéñêèõ USB-êàáåëåé ðàáîòàþò
áåç ïðîáëåì. Ïðîñòåéøàÿ
ïðîâåðêà - êàáåëü äîëæåí îïðåäåëÿòüñÿ êîìïüþòåðîì, äàæå åñëè òåëåôîí ê
íåìó íå ïîäêëþ÷åí.
Òàêæå î íàëè÷èè USB-to-COM êîíâåðòåðà ãîâîðèò íåáîëüøàÿ êîðîáî÷êà
ïîñåðåäèíå.  ñëó÷àå
COM-êàáåëÿ, ïèòàíèå äîëæíî ïîäàâàòüñÿ îò COM-ïîðòà (âèçóàëüíî
îïðåäåëèòü ýòî
íåâîçìîæíî).
Èç îðèãèíàëüíûõ êàáåëåé ñ òåëåôîíîì ðàáîòàþò DCA-510, DCA-512, íå
ðàáîòàþò DCA-500, DCA-540.

Ðàáîòà ñ ôëåøåðîì ÷åðåç IRDA èëè bluetooth íåâîçìîæíà.


Íåìíîãî îá èñïîëüçóåìûõ òåðìèíàõ

Ôëåø (Flash) - ìèêðîñõåìà
ýíåðãîíåçàâèñèìîé ïàìÿòè òåëåôîíà. Â íåé õðàíÿòñÿ
ïðîøèâêà, íà÷àëüíûé çàãðóç÷èê, íàñòðîéêè òåëåôîíà, ôàéëîâàÿ ñèñòåìà.

Ôóëôëåø (Fullflash) - ïîëíàÿ
êîïèÿ èíôîðìàöèè ôëåø-ïàìÿòè. Â çàâèñèìîñòè îò
ìîäåëè òåëåôîíà èìååò ðàçìåð 32, 64 èëè 96 ìáàéò. Èìåÿ áýêàï fullflash,
âñåãäà ìîæíî
âîññòàíîâèòü òåëåôîí ïîñëå íåóäà÷íûõ ïàò÷åé èëè ñáîåâ ïðè ïðîøèâêå.
Ïîýòîìó áýêàï
fullflash - ýòî ïåðâîå, ÷òî âû äîëæíû ñäåëàòü ïåðåä òåì, êàê ÷òî-òî
ìåíÿòü â
òåëåôîíå.

Áóòêîð (Bootcore) - çàãðóç÷èê,
íàèáîëåå êðèòè÷íàÿ ÷àñòü flash. Åñëè áóòêîð
èñïîð÷åí, äëÿ âîññòàíîâëåíèÿ òåëåôîíà ïîòðåáóåòñÿ ðàçáèðàòü òåëåôîí è
çàìûêàòü òåñòïîèíò.
Èìåííî
ïîýòîìó ïî óìîë÷àíèþ çàïèñü â áóòêîð çàïðåùåíà; îáîéòè ýòî îãðàíè÷åíèå
ìîæíî, çàïóñòèâ ôëåøåð ñ êëþ÷îì /B.

Firmware - ïðîãðàììíîå
îáåñïå÷åíèå (ïðîøèâêà) òåëåôîíà.

EEPROM - çäåñü õðàíÿòñÿ
èíäèâèäóàëüíûå íàñòðîéêè òåëåôîíà (IMEI, êëþ÷
çàãðóçêè, íàñòðîéêè GSM/GPRS, íåñòðîéêè àêêóìóëÿòîðà...) Ñîñòîèò èç
äâóõ ÷àñòåé - EEFULL è EELITE. Òåðÿòü ñâîé " ðîäíîé " EEPROM êðàéíå
íåæåëàòåëüíî, õîòÿ
åãî è ìîæíî ÷àñòè÷íî âîññòàíîâèòü ñ ïîìîùüþ ïðîãðàììû PapuaUtils.

FFS - ôàéëîâàà ñèñòåìà òåëåôîíà,
äîñòóïíàÿ ÷åðåç MPM è äðóãèå
ïðîãðàììû. Ñîñòîèò èç 3-õ äèñêîâ: 0: - ïîëüçîâàòåëüñêàÿ FFS, 1: - êýø,
2:
- ñèñòåìíàÿ FFS.
Äèñêè 1: è 2: âèäíû òîëüêî ïðè ââåä¸ííîì SKEY.

Áóòëîàäåð (Bootloader) -
íåáîëüøàÿ
ïðîãðàììà, çàãðóæàåìàÿ ôëåøåðîì â òåëåôîí ïðè
êîðîòêîì íàæàòèè íà êðàñíóþ êíîïêó. Â íåé ðåàëèçîâàíû ôóíêöèè
÷òåíèÿ/çàïèñè
ôëåø-ïàìÿòè. Äëÿ
çàãðóçêè áóòëîàäåðà íåîáõîäèì ëèáî BOOTKEY ýòîãî òåëåôîíà, ëèáî â
òåëåôîí äîëæåí áûòü
ââåä¸í SKEY.

SKEY - ñåðâèñíûé êëþ÷ òåëåôîíà,
8-çíà÷íîå ÷èñëî. Ïîñëå ââîäà SKEY, â
òåëåôîí & nbsp; ìîæíî çàãðóæàòü ñâîè ëîàäåðû; òàêæå îòêðûâàåòñÿ Developer
menu, äîñòóï
ê äèñêàì 1: è 2:, äîñòóï ê çàùèù¸ííûì áëîêàì EEPROM.

BOOTKEY - çàãðóçî÷íûé êëþ÷,
èñïîëüçóåòñÿ äëÿ çàãðóçêè ïðîèçâîëüíîãî
áóòëîàäåðà â òåëåôîí.  îòëè÷èå îò SKEY, íå õðàíèòñÿ â òåëåôîíå, à
ïîñûëàåòñÿ ñ
áóòëîàäåðîì.

HASH - 16-áàéòíîå ÷èñëî, óíèêàëüíîå
äëÿ êàæäîãî òåëåôîíà. Èñïîëüçóåòñÿ
äëÿ ïðîâåðêè êëþ÷åé. Çàïèñàí â áóòêîðå.

ESN - óíèêàëüíûé ñåðèéíûé íîìåð
òåëåôîíà. Õðàíèòñÿ â îäíîêðàòíî
ïðîãðàììèðóåìîé îáëàñòè ìèêðîñõåìû ôëåø-ïàìÿòè, èçìåíèòü åãî íåâîçìîæíî.

Òåñòïîèíò (Testpoint) - òî÷êà
íà ïå÷àòíîé ïëàòå òåëåôîíà. Çàêîðîòèâ å¸ íà çåìëþ, ìû
ñìîæåì çàãðóçèòü ñâîé áóòëîàäåð, íå çíàÿ êëþ÷åé. Åñòåñòâåííî, äëÿ ýòîãî
ïîòðåáóåòñÿ ðàçîáðàòü òåëåôîí, ÷òî ëèøàåò âàñ ãàðàíòèè (õîòÿ, åñëè âñ¸
äåëàòü àêêóðàòíî...)



Ðàñ÷åò êëþ÷åé
Äëÿ òîãî, ÷òîáû ôëåøåð " óâèäåë " òåëåôîí, âàì íåîáõîäèìî
óçíàòü SKEY èëè BOOTKEY .
Äëÿ ýòîãî åñòü 3 ñïîñîáà:

1. Âû÷èñëåíèå êëþ÷åé ñ ïîìîùüþ ìèäëåòà bsReader
èëè px75v1.
Ñêîïèðóéòå ïàïêó bsReader â ïàïêó Applications òåëåôîíà (äëÿ S75/SL75 è
Benq-Siemens) èëè px75v1 â Java\Jam\Applications (äëÿ ìëàäøèõ ìîäåëåé),
çàòåì
÷åðåç ìåíþ " Ïðèëîæåíèÿ " çàïóñòèòå ìèäëåò. ×åðåç 5-15 ìèíóò ìèäëåò
äîëæåí âûäàòü
êîäû HASH è ESN .
Çàïóñòèòå ôëåøåð, âûáåðèòå â ìåíþ " Êîäû " - & gt; " Ðàñ÷¸ò SKEY è BOOTKEY " ,
ââåäèòå îïèñàíèå òåëåôîíà, HASH è ESN. Ãåíåðàöèÿ êëþ÷à äëèòñÿ îáû÷íî äî
10 ìèíóò.
Îäíîâðåìåííî áóäåò ñãåíåðèðîâàí è ëîàäåð äëÿ V_Klay, ñêîïèðóéòå åãî â
& lt;êàòàëîã_VKlay & gt;\data\loaders.
Ïðè æåëàíèè, âû ìîæåòå ââåñòè ðàññ÷èòàííûé SKEY â òåëåôîí ( " Êîäû " - & gt;
" Ââåñòè SKEY " ).


Î ìèäëåòàõ bsReader è px75v1: îíè èñïîëüçóþò
îøèáêó â java, áëàãîäàðÿ êîòîðîé
âîçìîæíî ïðÿìîå ÷òåíèå ïàìÿòè òåëåôîíà. Ìèäëåò íå âñåãäà
ñòàáèëüíî ðàáîòàåò, èíîãäà çàâèñàåò,
èíîãäà âûäà¸ò Exception, èíîãäà âûêëþ÷àåò òåëåôîí. Åñëè ó âàñ ñ
ïåðâîãî ðàçà íå ïîëó÷èëîñü,
ïðîáóéòå åù¸. Ðàíî èëè ïîçäíî îøèáêó â java èñïðàâÿò. Ïîýòîìó,
åñëè ó âàñ ìèäëåò ñòàáèëüíî
âûäà¸ò îäèí è òîò æå Exception, ñêîðåå âñåãî, ýòî è ñëó÷èëîñü.
Íå çàñûïàéòå ìåíÿ ïèñüìàìè ñ
âîïðîñîì " à êîãäà ïîÿâèòñÿ íîâàÿ âåðñèÿ? " Â ñâåòå ïîñëåäíèõ
ñîáûòèé ñ Benq-Siemens -
ñêîðåå âñåãî íèêîãäà. Èñïîëüçóéòå ìåòîäû 2 è 3.


2. SKEY ìîæíî êóïèòü, ãäå èìåííî - èùèòå â
èíòåðíåòå. Åñëè âàì
èçâåñòåí SKEY âàøåãî òåëåôîíà, âûáåðèòå " Êîäû " - & gt; " Ââåñòè SKEY " .
Ïîñëå ââîäà êëþ÷à
ôëåøåð ðàáîòàåò ñ òåëåôîíîì áåç êàêèõ-ëèáî äîïîëíèòåëüíûõ äåéñòâèé.

3. Åñëè óçíàòü SKEY âû íå
ìîæåòå, à ìèäëåò ïî
êàêèì-ëèáî ïðè÷èíàì íå
ðàáîòàåò, åäèíñòâåííûé âàðèàíò - òåñòïîèíò .
Ôîòîãðàôèè òåñòïîèíòîâ
äëÿ ðàçíûõ ìîäåëåé åñòü íà http://allsiemens.com/testpoints
Òåñòïîèíò íóæíî çàêîðà÷èâàòü íà çåìëþ ÷åðåç ðåçèñòîð 10-50 îì. Ìîæíî
èñïîëüçîâàòü ïðîñòî êàêîé-íèáóäü ìåòàëëè÷åñêèé ïðåäìåò, íî òîãäà íóæíî
ðàáîòàòü î÷åíü
àêêóðàòíî, ò.ê. ñëó÷àéíîå çàìûêàíèå íå òîãî êîíòàêòà íà ïëàòå ìîæåò
âûâåñòè òåëåôîí èç ñòðîÿ. Â ôëåøåðå íóæíî âûáðàòü âàðèàíò çàãðóçêè
" Òåñòïîèíò " , äàëåå íàæàòü
" Ïîäêëþ÷åíèå " , çàêîðîòèòü òåñòïîèíò, ïîñëå ÷åãî íàæàòü êðàñíóþ êíîïêó,
è â òå÷åíèå 3-õ ñåêóíä
îòêëþ÷èòü òåñòïîèíò. Ïîñëå ÷åãî ìîæíî âûáèðàòü " Êîäû " - & gt; " Ðàñ÷¸ò
SKEY è BOOTKEY "
(çíà÷åíèÿ HASH è ESN óæå ñ÷èòàíû èç òåëåôîíà).



Ðàáîòà ñ ôëåøåðîì






ÏÅÐÅÄ ËÞÁÛÌÈ
ÈÇÌÅÍÅÍÈßÌÈ
ÔËÅØÀ ÎÁßÇÀÒÅËÜÍÎ ÑÄÅËÀÉÒÅ ÏÎËÍÛÉ ÁÝÊÀÏ!!!
ÂÑÅ ÈÇÌÅÍÅÍÈß Â ÔËÅØÅ ÏÐÎÈÇÂÎÄÈÒÅ ÏÐÈ
ÏÎËÍÎÑÒÜÞ ÇÀÐ߯ÅÍÍÎÌ ÀÊÊÓÌÓËßÒÎÐÅ.




Äëÿ ïîäêëþ÷åíèÿ ê òåëåôîíó íóæíî óêàçàòü COM-ïîðò, ñêîðîñòü ïîðòà,
âûáðàòü áóò-êëþ÷ âàøåãî òåëåôîíà. Äëÿ COM-ïîðòà ñî ñòàíäàðòíûìè
äðàéâåðàìè ìàêñèìàëüíàÿ ñêîðîñòü - 115200 êáèò/ñ, íà íåêîòîðûõ
ìàòåðèíêàõ ìîæíî ïîëó÷èòü áîëåå âûñîêèå ñêîðîñòè (ïîäðîáíåå â ýòîé
òåìå). Äëÿ USB-êàáåëÿ äîñòóïíû ñêîðîñòè äî 1600000; ðåàëüíî
ìàêñèìàëüíàÿ ñêîðîñòü çàâèñèò îò êà÷åñòâà êàáåëÿ, íóæíî ïðîâåðÿòü
îïûòíûì ïóò¸ì.
 ñïèñêå áóò-êëþ÷åé íóæíî âûáðàòü êëþ÷, ïîñ÷èòàííûé
äëÿ âàøåãî òåëåôîíà. Åñëè â òåëåôîí ââåä¸í SKEY ,
ôëåøåð áóäåò ðàáîòàòü ñ ëþáûì áóò-êëþ÷îì.
Åñëè âìåñòî COM-ïîðòà âûáðàòü " Ôàéë " , ôëåøåð ïðåäëîæèò îòêðûòü ôàéë ôóëôëåøà , ñ êîòîðûì áóäåò ðàáîòàòü, êàê ñ
òåëåôîíîì (èíîãäà ýòî ìîæåò áûòü ïîëåçíî).

Áýêàï: ñîõðàíåíèå îáðàçà ôëåø-ïàìÿòè
èëè å¸ ÷àñòè â ôàéë ñ ðàñøèðåíèåì fbk. Ôëåøåð ñïðîñèò, ÷òî èìåííî âû
õîòèòå çàáýêàïèòü - âåñü ôëåø, áóòêîð , ïðîøèâêó , ôàéëîâóþ ñèñòåìó
èëè EEPROM . Âàì íå íóæíî ðàññ÷èòûâàòü àäðåñ è
äëèíó ó÷àñòêà ïàìÿòè, ôëåøåð âñ¸ äåëàåò àâòîìàòè÷åñêè.

Âîññòàíîâëåíèå: çàïèñü ñîõðàí¸ííîãî îáðàçà èç & nbsp;
fbk-ôàéëà îáðàòíî â ôëåø.  ñëó÷àå ïîëíîãî áýêàïà, âû ìîæåòå
âîññòàíîâèòü íå âåñü ôóëôëåø, à òîëüêî åãî ÷àñòü (íàïðèìåð, ôàéëîâóþ
ñèñòåìó). Âîññòàíîâèòü áóòêîð ìîæíî, òîëüêî åñëè ôëåøåð çàïóùåí ñ
êëþ÷îì & nbsp; /B.
Ïî óìîë÷àíèþ, ôëåøåð âîññòàíàâëèâàåò òîëüêî èçìåíèâøèåñÿ áëîêè, ÷òî
çíà÷èòåëüíî óñêîðÿåò âîññòàíîâëåíèå â ñëó÷àå íåáîëüøèõ èçìåíåíèé.
Ôëåøåð ïðîâåðÿåò, èçìåíèëñÿ áëîê èëè íåò, ñðàâíèâàÿ êîíòðîëüíóþ ñóììó
(CRC32) áëîêà â òåëåôîíå è íà äèñêå. Òåîðåòè÷åñêè åñòü âåðîÿòíîñòü
(1/4000000000), ÷òî ó ðàçíûõ áëîêîâ ñîâïàä¸ò êîíòðîëüíàÿ ñóììà. & nbsp;
Íà ýòîò ñëó÷àé åñòü îïöèÿ " Âîññòàíàâëèâàòü íåèçìåíèâøèåñÿ áëîêè " .

Êàðòà ïàìÿòè: ïðîñìîòð â ãðàôè÷åñêîì âèäå ðàñïîëîæåíèÿ
áëîêîâ â ïàìÿòè. Òàêæå ìîæíî ñðàâíèòü òåêóùåå ñîñòîÿíèå òåëåôîíà ñ
áýêàïîì, ôëåøåð ïîìåòèò íà êàðòå èçìåíèâøèåñÿ áëîêè.

Ôîðìàòèðîâàíèå ÔÑ: ïî ýòîé êîìàíäå ôîðìàòèðóåòñÿ äèñê
0: òåëåôîíà. Ïîñëå ôîðìàòèðîâàíèÿ íóæíî âêëþ÷èòü òåëåôîí è ïîäîæäàòü
íåñêîëüêî ìèíóò - ïðîèñõîäèò èíèöèàëèçàöèÿ ôàéëîâîé ñèñòåìû.

Èçìåíèòü ìîäåëü òåëåôîíà: ýòà îïöèÿ íóæíà â òîì ñëó÷àå,
åñëè âû õîòèòå çàëèòü â òåëåôîí ïðîøèâêó îò äðóãîé ìîäåëè. Î òîì, êàêóþ
ïðîøèâêó â êàêîé òåëåôîí ìîæíî çàëèòü, ÷èòàéòå íà ôîðóìå . Ïîëüçîâàòüñÿ ýòîé
îïöèåé ñëåäóåò îñòîðîæíî, ò.ê. ïðè ýòîì èçìåíÿåòñÿ bootcore .

Çàïèñü ôëåø, ÷òåíèå ôëåø: íèçêîóðîâíåâàÿ ðàáîòà ñ
ôëåø-ïàìÿòüþ. Çäåñü âû ñàìè äîëæíû óêàçàòü àäðåñ è äëèíó ó÷àñòêà
ïàìÿòè. Íóæíî ïîìíèòü, ÷òî ôëåø-ïàìÿòü ðàçáèòà íà áëîêè îïðåäåë¸ííîé
äëèíû (64ê, 128ê, 256ê; ýòîò ðàçìåð çàâèñèò îò òèïà ìèêðîñõåìû ïàìÿòè è
íå âñåãäà ñîâïàäàåò ñ ðàçìåðîì áëîêà, ïîêàçûâàåìîãî â êàðòå ïàìÿòè).
Ïðè çàïèñè àäðåñ è äëèíà ó÷àñòêà äîëæíû áûòü êðàòíû ðàçìåðó áëîêà, ïðè
÷òåíèè ìîæíî óêàçûâàòü ëþáîé àäðåñ è äëèíó.



Îïöèè êîìàíäíîé ñòðîêè
/L - ïîêàçàòü ëîã êîìïîðòà
/B - ðàçðåøèòü çàïèñü â bootcore (ïîëüçîâàòüñÿ ñ
îñòîðîæíîñòüþ!)



Âîçìîæíûå ïðîáëåìû ïðè ðàáîòå ñ ïðîãðàììîé è èõ ðåøåíèå:

1. Ôëåøåð âîîáùå íå îòçûâàåòñÿíà íàæàòèå êðàñíîé êíîïêè -
ïðîâåðüòå
íîìåð êîìïîðòà (â ñëó÷àå USB-êàáåëÿ ýòîò íîìåð ìîæåò ìåíÿòüñÿ); âûáðàíà
ñëèøêîì âûñîêàÿ ñêîðîñòü (ïîïðîáóéòå íà ñòàíäàðòíîé 115200); âàø
òåëåôîí íå ïîääåðæèâàåòñÿ ôëåøåðîì; ó âàñ
íåïîäõîäÿùèé êàáåëü .

2. Ïîñëå íàæàòèÿ êðàñíîé êíîïêè âîçíèêàåò îøèáêà " Íåò îòâåòà îò ëîàäåðà
(êëþ÷ íå ïðèíÿò) " . Åñëè ýòî íîâûé òåëåôîí, äëÿ íåãî íóæíî âû÷èñëèòü
áóò-êëþ÷ (êàê ýòî
äåëàåòñÿ, îïèñàíî âûøå ). Åñëè êëþ÷ óæå áûë
ñãåíåðèðîâàí, îí áóäåò â ñïèñêå.

3. Ïðè çàïóñêå âûäà¸òñÿ ñîîáùåíèå " Íå ìîãó ïðî÷èòàòü èíôîðìàöèþ î
òåëåôîíå " - ñêîðåå âñåãî, ýòî íîâàÿ ìîäåëü èëè ìîäèôèêàöèÿ òåëåôîíà,
íåèçâåñòíàÿ ôëåøåðó.

4. Ïðè ðàáîòå ñ ôëåøåðîì ñâÿçü îáðûâàåòñÿ ñ ñîîáùåíèåì " Lost connection
to mobile " - ïðîâåðüòå, ÷òîá àêêóìóëÿòîð áûë ïîëíîñòüþ çàðÿæåí; âòîðàÿ
âîçìîæíàÿ ïðè÷èíà - ïðîáëåìíûé êàáåëü (ìîæåò âîçíèêàòü ñ êàáåëÿìè
íåèçâåñòíûõ êèòàéñêèõ ïðîèçâîäèòåëåé).

5. Ïðè ÷òåíèè î÷åíü ìíîãî îøèáîê (faults) - ïîíèçüòå ñêîðîñòü îáìåíà.
Íåáîëüøîå êîëè÷åñòâî îøèáîê (4-5) âïîëíå äîïóñòèìî, åñëè æå èõ áîëüøå
20, ïðàâèëüíîñòü ñëèòîãî áåêàïà íå ãàðàíòèðîâàíà, à óæ çàëèâàòü ÷òî-òî
â ýòîì ñëó÷àå - áîæå óïàñè...

6. Ïðè ïîïûòêà çàïèñè âûäà¸òñÿ ñîîáùåíèå òèïà " Area begins not on flash
block bound " - çàïèñü â ôëåø âîçìîæíà òîëüêî áëîêàìè îïðåäåë¸ííîãî
ðàçìåðà. Ðàçìåð áëîêà ìîæåò áûòü 64ê (10000), 128ê (20000) èëè 256ê
(40000). Àäðåñ è äëèíà äîëæíû áûòü êðàòíûìè ðàçìåðó áëîêà. Ò.å. â
ñëó÷àå ðàçìåðà
áëîêà 128ê ïðàâèëüíûé àäðåñ áóäåò íàïðèìåð A07E0000, íî íå A07F0000.

8. Ïðè çàïèñè âûäà¸òñÿ ñîîáùåíèå " Unknown flash type ÕÕÕÕ " - ó âàñ
íåèçâåñòíûé ôëåøåðó òèï ìèêðîñõåìû ôëåø-ïàìÿòè. Ñîîáùèòå îá ýòîì àâòîðó
(ïðèøëèòå òàêæå ëîã ðàáîòû ïðîãðàììû, çàïóñòèâ x65flasher ñ êëþ÷îì /L).

9. Ïîñëå ôîðìàòèðîâàíèÿ ôàéëîâîé ñèñòåìû òåëåôîí íå ïîäà¸ò ïðèçíàêîâ
æèçíè - âñ¸ íîðìàëüíî, ïðîñòî ïîäîæäèòå 3-4 ìèíóòû.

10. Âû ÷òî-òî ñäåëàëè íå òàê, èëè âî âðåìÿ ïðîøèâêè ïðîïàë ñâåò, èëè...
â îáùåì, òåëåôîí óìåð è íè íà ÷òî íå ðåàãèðóåò - ñíà÷àëà ïîïðîáóéòå
ïðîñòî âîññòàíîâèòüñÿ èç áýêàïà (âû âåäü åãî ñäåëàëè, òàê?) Åñëè íå
ïîëó÷àåòñÿ äàæå ñîåäèíèòüñÿ ñ òåëåôîíîì, âîçìîæíî, ðàçðÿäèëñÿ
àêêóìóëÿòîð - ïîïðîáóéòå ñ äðóãèì. Åñëè ñîåäèíèòüñÿ òàê è íå óäàëîñü
(óáèò áóòêîð), ïðèãîòîâüòåñü ðàçáèðàòü òåëåôîí è çàêîðà÷èâàòü
òåñòïîèíò. Åñëè ó âàñ íåò áýêàïà, âåðíóòü òåëåôîí ê æèçíè ïîìîæåò
òîëüêî ïðîãðàììà PapuaUtils ( http://papuas.allsiemens.com ).




ÏÐÎÃÐÀÌÌÀ ÐÀÑÏÐÎÑÒÐÀÍßÅÒÑß " ÊÀÊ ÅÑÒÜ " , ÀÂÒÎÐ ÍÅ ÍÅÑÅÒ
ÎÒÂÅÒÑÒÂÅÍÍÎÑÒÈ ÇÀ ÂÎÇÌÎÆÍÛÉ ÓÙÅÐÁ, ÏÐÈ×ÈÍÅÍÍÛÉ Â ÐÅÇÓËÜÒÀÒÅ
ÈÑÏÎËÜÇÎÂÀÍÈß ÝÒÎÉ ÏÐÎÃÐÀÌÌÛ. ÂÛ ÍÅ ÌÎÆÅÒÅ ÈÑÏÎËÜÇÎÂÀÒÜ ÝÒÓ
ÏÐÎÃÐÀÌÌÓ ÈËÈ ÅÅ ×ÀÑÒÜ Â ÊÎÌÌÅÐ×ÅÑÊÈÕ
ÖÅËßÕ ÁÅÇ ÐÀÇÐÅØÅÍÈß ÀÂÒÎÐÀ.




(ñ) 2004-2006 by Chaos
Boot password generator (c) by Papuas
thanks to SiNgle, ACiD[mrp], LazyC0DEr, Phantom