- Suna la callcenter!
- Trimite sms la 75xx tarif 100E cu tva inclus si primesti xxx! :D
Sa fim seriosi! Daca exista alta metoda era demult publica!
Sa asteptam trecerea definitiva la n3 si odata cu asta postul lui @un user! :)
Printable View
- Suna la callcenter!
- Trimite sms la 75xx tarif 100E cu tva inclus si primesti xxx! :D
Sa fim seriosi! Daca exista alta metoda era demult publica!
Sa asteptam trecerea definitiva la n3 si odata cu asta postul lui @un user! :)
Omul a spus ca atunci cand nu va mai fi necesar,deci cand nu se vor mai folosi receptoare 1160 din ce inteleg eu,nu legat de neagra 3.
O metoda ar putea fi,dar intradevar legata de nagra 2.Era alt topic despre asta si nu prea cred ca ar merge pentru marea masa deoarece ar trezi mari suspiciuni.Totusi metoda ar merge pentru toate receptoarele si nu numai pentru 1160.
PS: De fapt ce daca trezeste suspiciuni?Teoretic daca aceste date sunt extrase din EMM-uri ne putem folosi de o eroare fictiva aparuta pe receptor si sa incercam sa-i determinam sa ne retrimita acel emm.
PPS:Si totusi nu se poate.
[Only registered and activated users can see links. Click Here To Register...]
Asta am scris acum mai bine de o luna, de atunci cam asa stau lucrurile:Quote:
Originally Posted by cristianio [Only registered and activated users can see links. Click Here To Register...]
-a fost un membru din tara care s-a oferit sa ma ajute, dar sincer nu am avut incredere sa trimit doua receptoare prin curierat.Au fost si membri care au cerut un pret .... jenant.
-un membru a incercat sa ma ajute respectiv a razuit pasta dar nu reusit sa extraga datele, spunand ca nu merge pentru cazul cand ai cartela Nagra 3.
-am gasit in bucuresti o persoana (repara calculatoare) care are instalatie profesionala de dezlipit si lipit pentru pini.Din schema afisat de fanta trebuie lipite si niste rezistente si mufa de adaptare la laptop.Persoana respectiva a zis ca imi face si aceste modificari.
-nu am gasit pe nimeni in bucuresti, pentru descarcarea datelor in calculator si setarea dreamului.
-am obosit, oameni buni, routerul a crapat de doua ori in garantie, dreamul nu reusesc sa il vad cu DCC in calculator,face figuri, ma dau batut...:dance:,
cred ca imi iau un humax (chiar si la mana doua) il imperechez cu cartela digi si gata, ca am si nevasta care ma incurajeaza, din spate...."de ce nu putem fi oameni normali sa avem si noi cablu":offtopic:
...vezi sa nu-ti cumperi un Humax GOGU+ 2 ca-i mai a dracului decat hyundai-ul . Am primit o "conserva" dubla de hyundai care s-a defectat, l-am dus in service la ei, l-au reparat,dar nu mai mergea cardul de pe primul slot. Am sunat la ei cerandu-le sa-mi rezolve problema. Am aflat cu stupoare caci mi-au schimbat receptorul si cartela nu este imperecheata cu el. Am cerut sa-mi imperecheze atunci cartela cu un receptor (mai performant) de la ei si anume un Humax GOGU+ 2. Nici nu au vrut sa auda de asa ceva spunandu-mi caci cartela trebuie imperecheata cu "conserva" comform abonamentului. Atunci m-am decis sa desfac Humaxul , sa-i aflu Box ID-ul si....l-am stricat definitiv. Asta este. Totusi, din aceasta patanie am aflat ceva,si anume Box ID-ul "conservei",iar acum cartela cu pricina functioneaza impecabil intr-un Visionet la care am editat (din meniu) Box ID-ul " conservei". Asta este...
P.S. Daca erai din TM, te ajutam cu cea mai mare placere....gratis.
Stima
@dagos citeste te rog ce este aici, in special prevederile punctului nr.12: [Only registered and activated users can see links. Click Here To Register...]
Totusi, din aceasta patanie am aflat ceva,si anume Box ID-ul "conservei",
cum ai aflat chestia asta ? la care conserva?
...la Hyundai. Cum? Extrem de simplu. Am interfata JTAG si l-am citit cu j***s.exe :)
[Only registered and activated users can see links. Click Here To Register...] ; al treilea (si ultimul pe ziua de azi) post editat
@Zmeura:
Secret Key Exchange
For symmetric key cryptography to work for online communications, the secret key must be securely shared with authorized communicating parties and protected from discovery and use by unauthorized parties. Public key cryptography can be used to provide a secure method for exchanging secret keys online. Two of the most common key exchange algorithms are the following:
*
Diffie-Hellman Key Agreement algorithm
*
RSA key exchange process
Both methods provide for highly secure key exchange between communicating parties. An intruder who intercepts network communications cannot easily guess or decode the secret key that is required to decrypt communications. The exact mechanisms and algorithms that are used for key exchange varies for each security technology. In general, the Diffie-Hellman Key Agreement algorithm provides better performance than the RSA key exchange algorithm.
Diffie-Hellman Key Agreement
Public key cryptography was first publicly proposed in 1975 by Stanford University researchers Whitfield Diffie and Martin Hellman to provide a secure solution for confidentially exchanging information online. Figure 14.5 shows the basic Diffie-Hellman Key Agreement process.
Figure 14.5 Diffie-Hellman Key Agreement
Diffie-Hellman key agreement is not based on encryption and decryption, but instead relies on mathematical functions that enable two parties to generate a shared secret key for exchanging information confidentially online. Essentially, each party agrees on a public value g and a large prime number p . Next, one party chooses a secret value x and the other party chooses a secret value y . Both parties use their secret values to derive public values, g x mod p and g y mod p, and they exchange the public values. Each party then uses the other party's public value to calculate the shared secret key that is used by both parties for confidential communications. A third party cannot derive the shared secret key because they do not know either of the secret values, x or y .
For example, Alice chooses secret value x and sends the public value g x mod p to Bob. Bob chooses secret value y and sends the public value g y mod p to Alice. Alice uses the value g xy mod p as her secret key for confidential communications with Bob. Bob uses the value g yx mod p as his secret key. Because g xy mod p equals g yx mod p , Alice and Bob can use their secret keys with a symmetric key algorithm to conduct confidential online communications. The use of the modulo function ensures that both parties can calculate the same secret key value, but an eavesdropper cannot. An eavesdropper can intercept the values of g and p , but because of the extremely difficult mathematical problem created by the use of a large prime number in mod p, the eavesdropper cannot feasibly calculate either secret value x or secret value y . The secret key is known only to each party and is never visible on the network.
Diffie-Hellman key exchange is widely used with varying technical details by Internet security technologies, such as IPSec and TLS, to provide secret key exchange for confidential online communications. For technical discussions about Diffie-Hellman key agreement and how it is implemented in security technologies, see the cryptography literature that is referenced under "Additional Resources" at the end of this chapter.
Top Of Page
RSA Key Exchange
The Rivest-Shamir-Adleman (RSA) algorithms available from RSA Data Security, Inc., are the most widely used public key cryptography algorithms. For RSA key exchange, secret keys are exchanged securely online by encrypting the secret key with the intended recipient's public key. Only the intended recipient can decrypt the secret key because it requires the use of the recipient's private key. Therefore, a third party who intercepts the encrypted, shared secret key cannot decrypt and use it. Figure 14.6 illustrates the basic RSA key exchange process.
Figure 14.6 Basic RSA Key Exchange
The RSA key exchange process is used by some security technologies to protect encryption keys. For example, EFS uses the RSA key exchange process to protect the bulk encryption keys that are used to encrypt and decrypt files.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In cazul receptoarelor satelit schimbarea keylor RSA se face OTA(Over The Air).
Doar BK este in receptor,RSA-urile sint in card.
Sint cateva programe+phoenix programer la 3,57 Mhz,la ora actuala,care permit accesul la cardurile noi.Un exemplu este programul GEAUnloopixN2.
Bafta.
Numai Bine tuturor
PapaDan
Gresit.Sunt mai multe chei RSA la mijloc,cea despre care vorbesc este in receptor impreuna cu beka si nu se schimba (vorbim de conservele vechi).Quote:
Originally Posted by PapaDan [Only registered and activated users can see links. Click Here To Register...]
In rest da,sunt alte chei RSA aflate in card care se pot schimba.:)
Recomandati-mi pe cineva care poate scoate cheile dintr-un receptor. Contra cost binenteles. Vreau pe cineva de incredere pentru ca n-as vrea sa trimit receptorul si sa raman fara el.
PM va rog.
P.S. Mentionez ca inca nu am facut abonamentul, asa ca puteti sa-mi recomandati ce receptor sa aleg. Care e mai usor de citit...
cred ca nu ai precizat exact ce vrei:
-chei care cripteaza transmisia TV,
-imperechere card cu un alt receptor.
deci ce anume vrei?
Hyundai HSS 1160NA :ha:Quote:
Originally Posted by Venom [Only registered and activated users can see links. Click Here To Register...]
Un ac6 in Hyundai HSS 1160NA mai e posibil sa doar ac3?
Merge oricum ca se estrage ce trebuie din receptor si nu din card.Nu conteaza cardul ca poate fi n3.
@gobi2000 in momentul cabd ai introdus card AC03 sau AC06 in receptor si ai dai drumul,cardul primeste EMM de dezactivare.Eu am studiat putin cardul inainte sa-l dau inapoi - a trebuit sa astept ca mi l-a adus cineva din tara.
Din cate sint informat au fost multe receptoare care au fost prajite chiar cu cardul nou,existand incompatibilitati intre noul card si softul de pe receptor dar vad ca nu pomeneste nimeni nimic(sau poate sint eu prea fixat pe Thread-ul asta).
Numai Bine Tuturor
PapaDan