04-30-2015, 08:43 AM
(This post was last modified: 05-01-2015, 09:23 AM by lemonforest.
Edit Reason: Read more stuff on another post.
)
I understand the RSA signed bios crap has been beat to death but I'm curious nonetheless. Using a handy tool like universal bios backup toolkit rips the BIOS rom in an unencrypted fashion so what's to stop a person from modded the ripped rom and re-flashing it or yanking the chip and using an eeprom programmer to write the unencrypted modded bios back? This wireless whitelist crap is irritating to say the least. Also posting the ROM for the viewing pleasure of anyone interested...
Hewlett-Packard-F.39.zip (Size: 1.33 MB / Downloads: 4)
-
CQ57-339WM rescued and made usable via - Core i7-2630QM, 8GB RAM, 500GB EVO 850
-edit
Meh, this post https://www.bios-mods.com/forum/Thread-P...-RSA-check quells my curiosity.
Hewlett-Packard-F.39.zip (Size: 1.33 MB / Downloads: 4)
-
CQ57-339WM rescued and made usable via - Core i7-2630QM, 8GB RAM, 500GB EVO 850
-edit
Meh, this post https://www.bios-mods.com/forum/Thread-P...-RSA-check quells my curiosity.