We want to know more now about the Hack, the reverse engeneering.
If you open the cdrom from Windows, in Hex, you'll get the contents, whithout the bootsector.
If you look at the dump (post 27), opened (as a HD) in hex (I use HXD),
you will get the contents of the CDRom at sector 64.
Just before that, at 63, you have some space; I am not saying it is useable, but you get some space.
Before that it is a mix of Device boot, ie menu, choice (clock, connect) and Cdrom boot.
After the end of the CDRom, space for the pictures.
The first 10000h, from sector 1,'they say', DON'T TOUCH.
Edit, there seems to be more CDRom going on after large area.
As if there was a second copy.
The guys behind the reversing are using the last spaces for the pictures for their own code.
Other than that
Some links, for those interested, are helpful:https://github.com/m...b/master/README
is a general Readme.https://github.com/m.../reverse/README
is the Reverse Readme.
AX20xDump_Tool (google it)
Tools, for the device.
Find them at http://openschemes.c...photo-frames/2/
in the X206 Firmware Source Code and SDK (9MB)
, under tools I think.
, @ http://openschemes.c...-that-was-easy/
General links, with discussions:http://tech.section5.ch/news/?p=68http://tech.section5.ch/news/?p=77
Come on, anyone!