Remember he using the AZBox s900, not the Solomend.
What are you trying to accomplish by loading the Ferg Firmware?
What are you trying to accomplish by loading the Ferg Firmware?
my sathawk works just only as a "FTA" hd box... even not reading some cards or cam! but in Fergusan...having some option there !, thats why badly i m trying to upgrade this s/w!Remember he using the AZBox s900, not the Solomend.
What are you trying to accomplish by loading the Ferg Firmware?
thank u, yeh i also just modified some thing in header and boot loader info but, still i m very very unlucky...not succeed! may b i have done something wrong!
can u able to upload again with original s/w via rs232?I tried that too. Wouldn't update via usb "wrong type". But it did load correctly via rs232, but when i turned it on it didn't boot. I did not overwrite the bootloader, because i didn't want to end up with a dead box.
can u able to upload again with original s/w via rs232?
may its possible if we upgrade the correct boot loader (is boot loader and tool available separately?) by tool!yea i got it back to noraml by putting the original s/w via r232. But i am not sure if this would have been possible if i tried to overwrite the bootloader
i already tried this and also i had put the clone firmware in to the solomend's dump(firmware area)-but N0 LUCK!If you open the Firm in Hex Editor, you can see where the different sections start.
Maybe copy the Bootloader from the Solomend Firm, replace in the Ferguson Firm and recalculate any check sums? At Your Own Risk!
Example Solomed posted FW ------------------------------------ Chunk0 (bootloader) 0x00000000: Chunk header = 2301001000000000 0x00000004: SIZE in hex = 00010000 0x0000000C: CRC in hex = 4E435243 * NCRC or Not used CRC 0x00000010: Chunk ID = bootloader 0x00000020: Manufacturer = SMT 0x00000026: Version = 1.0.0 0x00000030: Compile Date = 2009-08-27 Chunk1(maincode) 0x00010000: Chunk header = 01FE0101 0x00010004: SIZE in hex = 00124C2A (from 0x00010010 to the end of maincode) 0x0001000C: CRC in hex = 6E7DE53F 0x00010010: Chunk ID = maincode 0x00010020: Manufacturer = SMT 0x00010026: Version = 1.0.0 0x00010030: Compile Date = 2009-08-27 Seems like sathawks also uses some kind of protection (not too strong): sathawk maincode start ================= B929293329B62A0E2929292929292901 regular LZMA compressed maincode start ============================= 6C00008000E0B81A0000000000000020
too bad the sat list goes bye bye and back to eastern sats