This article documents the exciting work being done by some of our top contributers in our forum. The modifications performed on systems like the Dell 15z reflect the most advanced examples of BIOS modifications done within our community. For more information, please visit the thread.
Phoenix SecureCore Tiano, used by Dell, is a tough nut to crack – we came to what we have today by taking little steps on a road that wasn’t smooth to begin with. Phoenix nor Dell have provided any information regarding SCT 2.0 and to this day the BIOS on these machines has not been upgraded to 2.3.1 which allows for ME v8 (brings IVB CPU support) and SecureBoot capabilities.
The number one utility in all of our research is without a doubt AndyP’s Tool, which can be found here. Huge props to him – without his tool our work wouldn’t be possible. Please note, that for some reason later versions of this tool such as 2.11 don’t seem to unpack the BIOS.wph’s capsule properly, so use versions prior to that if you are going to attempt doing some *magic* on your own. There have been a new Phoenix Tool release v2.12 but I have yet to try it, I personally still use 2.02 and it has been producing stable and working output.
The BIOS chip structure is the following:
Platform: Intel(R) HM67 Express Chipset
— Flash Devices —
Size: 4096KB (32768Kb)
00000000h – 00000FFFh: Flash Descriptor Region
It has been quite a while since I have updated our members and visitors on the site’s status and discussed where we are looking to continue improving upon BIOS-Mods’ reputation as the number one BIOS/hardware modification community on the internet.
The amount of data we have collected on the BIOS modification process is tremendous. Over the past several years, we have successfully unlocked hundreds of motherboards and have created a readily available repository of modified BIOS images. As BIOS-Mods continues to gain user requests and interest in unlocking new motherboards with the latest technologies, we have continued to provide modified images for many mainstream consumer platforms thanks to the dedication, time, and effort of many talented community members.
As all of us at BIOS-Mods have busy lives and busy schedules, it requires many individuals to come forward to help others modify their BIOS images and add to the repository to assist both new and veteran users. While many of our normal moderators and I have had a very busy few months, this process has been somewhat reliant on the enthusiastic folks in our forums as of recent. Many users have also requested that more information become publically available on our website for learning how to modify various BIOS images. While some of this information is available, there is a fair amount of work to be done in order to update our public knowledge repository with the latest techniques and methods.
By: Derek J. Gordon.
Computer networks are inundated with unwanted email messages (emails) on a daily basis. These unwarranted messages are called SPAM, or unsolicited bulk, email. A majority of these messages are for illegal activities. However, some emails are legitimate messages from businesses to a consumer. While one email is minuscule, the number sent to an individual email address each day number in the thousands. In fact, a personal mail server typically processes three thousand emails per day that have no legitimate purpose or mail box for delivery. Corporate mail servers can process over a million SPAM emails per day. Larger internet service providers may process tens of millions of SPAM emails each day.
Originally, SPAM email came from legitimate business enterprises which could be tracked. Case law dealt with these companies and injunctions were granted to require that the companies stop their activities. Case law suggested that a SPAM company must stop their transmissions when an internet provider notified them that their messages were no longer welcome. This attitude held for a few months; however, much of the SPAM today is part of an underground activity outside the realm of legitimate business activities.
Anatolymik, author of HyperSLI, has developed a modified driver allowing M17x-R2 users to enable SLI on their laptop for the full graphics performance and experience. HyperSLI enables SLI with a click of the mouse on motherboards and chipsets normally considered to be “non-SLI” compatible. With the advent of HyperSLI and its wide range of success on a variety of systems, HyperSLI was adapted with the addition of a modified driver based off NVIDIA’s latest ForceWare version 290.53. By installing HyperSLI and the modified driver, users can have the same SLI capabilities that M18X owners currently have.
How does it work? – It’s pretty easy.
First, download the HyperSLI patch from here and run it. You will need to disable UAC and be running as Administrator in order to install the patch.
(For more information on HyperSLI for other systems, take a look here).