Archive for hack

Ironing out opensolaris 2008.05 issues

Posted in software with tags , , , , on 2008.05.12 by ipv5

(see also this post on how to install it on a Dell inspiron 2650 )

install flash player:

$ cd
$ mkdir .mozilla/plugins/
$ wget
$ tar xvjf flash_player_9_solaris_x86.tar.bz2
drwxr-xr-x leon.sha/other 0 2008-04-03 01:04 flash_player_9_solaris_r124_x86/
-rw-r--r-- leon.sha/other 856 2008-04-03 01:04 flash_player_9_solaris_r124_x86/flashplayer.xpt
-rwxr-xr-x leon.sha/other 6733684 2008-04-03 01:04 flash_player_9_solaris_r124_x86/
$ cp flash_player_9_solaris_r124_x86/* ~/.mozilla/plugins/

Pidgin does not start:

Invoke it via a shell script like this:


Icons not showing up in the menu:

the gnome menu reads /usr/share/applications for application.desktop files, packages do provide them, but if they are not showing up they got installed somewhere else, just copy/symlink ’em.
more on the .desktop format at

Nautilus is dumb:

You’ll need to create a Documents folder in your home, for a start.

Quick OpenSolaris pkg howto

Posted in software with tags , , , on 2008.05.11 by ipv5

Well, time for me to learn YAPMSTM (Yet Another Package Management System).
Opensolaris 2008.05 ships with the IPS Image Packaging System, which, even if it’s got very few packages, has both command line and gui tools.

search for an installed package:

# pkg list -s | egrep or whatever you like
FSWxorg-fonts X.Org Foundation X11 fonts
SUNW1394 Sun IEEE1394 Framework
SUNWDTraceToolkit SUNWDTraceToolkit


# pkg search -l zip
basename file usr/bin/zip pkg:/SUNWzip@2.32-0.86
# pkg info -l pkg:/SUNWzip@2.32-0.86
Name: SUNWzip
Summary: The Info-Zip (zip) compression utility
State: Installed
Authority: (preferred)
Version: 2.32
Build Release: 5.11
Branch: 0.86
Packaging Date: Sat Apr 26 18:12:56 2008
Size: 167 kB
FMRI: pkg:/SUNWzip@2.32,5.11-0.86:20080426T181256Z
# pkg contents pkg:/SUNWzip@2.32-0.86

check for updated packages:

# pkg list -u
entire 0.5.11-0.86 installed u---
openoffice 2.4.0-0.86 installed u---

search for and install new packages:

# pkg search -r rdesktop
basename file usr/bin/rdesktop pkg:/SUNWrdesktop@0.5.11-0.86
basename file usr/bin/rdesktop pkg:/SUNWrdesktop@0.5.11-0.86
# pkg install -n -v SUNWrdesktop
Before evaluation:

After evaluation:
None -> pkg:/SUNWrdesktop@0.5.11,5.11-0.86:20080426T180128Z
# pkg install -v SUNWrdesktop
Before evaluation:

After evaluation:
None -> pkg:/SUNWrdesktop@0.5.11,5.11-0.86:20080426T180128Z
Completed 1/1 42/42 0.27/0.27

Install Phase 55/55

add other repositories:

# pkg set-authority -O
# pkg set-authority -O
# pkg authority
AUTHORITY URL (preferred)
# pkg refresh --full


# pkg info -l pkg:/openoffice@2.4.0-0.86
Name: openoffice
Summary: Base module for 2.4
State: Installed
Authority: (preferred)
Version: 2.4.0
Build Release: 5.11
Branch: 0.86
Packaging Date: Thu Apr 24 10:48:39 2008
Size: 420.6 MB
FMRI: pkg:/openoffice@2.4.0,5.11-0.86:20080424T104839Z

# pkg info -r pkg:/openoffice@2.4.0-0.86
Name: openoffice
Summary: Base module for 2.4
State: Not installed
Authority: (preferred)
Version: 2.4.0
Build Release: 5.11
Branch: 0.86
Packaging Date: Mon Apr 28 16:36:48 2008
Size: 420.6 MB
FMRI: pkg:/openoffice@2.4.0,5.11-0.86:20080428T163648Z

I wonder why the build release does not increment… oh, well, it does not do it even for entire it does seem…

updating the system:

# pkg image-update -n -v
Before evaluation:

After evaluation:
pkg:/entire@0.5.11,5.11-0.86:20080426T182618Z -> pkg:/entire@0.5.11,5.11-0.86:20080504T125439Z
# pkg image-update -v
Before evaluation:

After evaluation:
pkg:/entire@0.5.11,5.11-0.86:20080426T182618Z -> pkg:/entire@0.5.11,5.11-0.86:20080504T125439Z
Update Phase 1/1
Install Phase 3/3
A clone of opensolaris exists and has been updated and activated. On next boot the Boot Environment opensolaris-1 will be mounted on '/'. Reboot when ready to switch to this updated BE.
# zfs list
rpool 3.18G 14.0G 56.5K /rpool
rpool@install 18.5K - 55K -
rpool/ROOT 2.95G 14.0G 18K /rpool/ROOT
rpool/ROOT@install 15K - 18K -
rpool/ROOT/opensolaris 233K 14.0G 2.12G legacy
rpool/ROOT/opensolaris-1 2.95G 14.0G 2.12G legacy
rpool/ROOT/opensolaris-1@install 352M - 2.22G -
rpool/ROOT/opensolaris-1@static:-:2008-05-10-22:50:27 44.0M - 2.12G -
rpool/ROOT/opensolaris-1/opt 450M 14.0G 450M /opt
rpool/ROOT/opensolaris-1/opt@install 121K - 3.61M -
rpool/ROOT/opensolaris-1/opt@static:-:2008-05-10-22:50:27 0 - 450M -
rpool/ROOT/opensolaris/opt 0 14.0G 450M /opt
rpool/export 233M 14.0G 19K /export
rpool/export@install 15K - 19K -
rpool/export/home 233M 14.0G 233M /export/home
rpool/export/home@install 19K - 21K -

interesting links:

how to create your own ips repository, some primers from the os people, either in plain old html, o as a screencast. And here there’s even more links.

Essential Firefox plugins

Posted in software with tags , on 2008.05.10 by ipv5

Well, not so essential maybe, but I cannot resist modding the hell out of this browser.

Screen Real estate

Browsing aids


Search engines

If anyone passing by knows some must-have plugins I’ve not mentioned please do leave a comment

Pystar’s Hax4u a bit overpriced

Posted in hardware, software with tags , , , on 2008.04.30 by ipv5

Here we go again with the open computer scam mac clone. Ars has some more coverage, but what’s really interesting there are the comments imo.

Oh, and there’s some photos too, but the guy posting it might be someone from pystar, so beware.

So, the deal it’s this: you get more or less 200€ worth of hardware, with a copy of Leopard. You got osx already hacked and runing, but to reinstall it you need to re-hack it too (or download the hacked images you find floating on the net). In your Country the Apple eula might not be legally binding, so it could even be legal, but given the number of people installing osx everywhere (including on the eepc and on the OQO) you’re probably better off buying the pieces wherever you want and assemble your own mac clone.

Google summer of code 2008

Posted in net, software with tags , , , , , , , , on 2008.04.23 by ipv5

Here we go again, let’s see what picks my fancy this time.

Mac clones a moving target

Posted in hardware with tags , , on 2008.04.18 by ipv5

Well, it seems the whole mac clone story is shadierthan I tought.
The guardian tracked down Pystar’s movements, both on the web and on the map.
Yep, on the map. Not only their website appeared out of nowhere a couple of weeks ago, but their physical address is moving around too, seems they’re changin it every few days.
Maybe it’s to escape the wrath of netkas, who claims pystar stole his v8 efi emulator.

Scam or no scam? Well, they promised Ars they’ll send them a unit for review, so we just have to sit back and wait.

Buy an already-hacked mac clone

Posted in hardware with tags , , on 2008.04.15 by ipv5

There’s people buying apple hardware because it is quality stuff, people with a ton of hardware already around hacking macosx to run on their iron.

And then there’s people offering you a pre-hacked mac minitower for sale at 400 bucks, yep, that’s right. Those soon-to-be-sued-to-hell guys at psystar offer you a mac clone with osx already installed.

If you want it, do get it fast, this box is making the rounds on the net and I doubt it will be avaiable for long.

List of hard disk ata master passwords

Posted in hardware with tags , , , , , on 2008.04.14 by ipv5

Ferreted this out after some hours of web searching, guess I can spare you the same trouble

If you find this stuff useful, please do leave a comment, “hi, it worked” is enough.

(nb: see my previous post for unlocking instructions)

SEAGATE -> “Seagate” +25 spaces

series N40P -> “Maxtor INIT SECURITY TEST STEP ” +1 or +2 spaces
series N40P -> “Maxtor INIT SECURITY TEST STEP F”
series 541DX -> “Maxtor” +24 spaces
series Athena (D541X model 2B) and diamondmax80 -> “Maxtor”


FUJITSU -> 32 spaces

SAMSUNG -> “ttttttttttttttttttttttttttttttttt” (32 times t)

series DTTA -> “CED79IJUFNATIT” +18 spaces
series DJNA -> “VON89IJUFSUNAJ” +18 spaces
series DPTA -> “VON89IJUFSUNAJ” +18 spaces
series DTLA -> “RAM00IJUFOTSELET” +16 spaces
series DADA-26480 (6,4gb) -> “BEF89IJUF__AIDACA” +15 spaces

HITACHI series DK23AA, DK23BA and DK23CA -> 32 spaces

TOSHIBA -> 32 spaces

For xbox hdds try “XBOXSCENE” or “TEAMASSEMBLY” too

Halt and Catch Fire

Posted in hardware with tags , , , , , , on 2008.04.10 by ipv5

Got a disk for cheap off ebay, since the user forgot the ata password. Turned out the disk was 0xDEAD anyway, but I’ve learned a bit more about the ata/pata commands.
If you got a locked disk and do not care much for the contents read on.

First thing first: you really do want to go pay HddGuru a visit, they host some really great tools like mhdd (which lets you send ata commands directly to the disk), a forum, and of course the ATA/ATAPI-8 revision 2b — AT Attachment — 8 ATA/ATAPI Command Set (January 10, 2006). A not-in-any-way-dull list of all the stuff you can send to your disk, including HCF but sadly lacking RAISE_FROM_THE_DEAD.

Ok, let’s grab/burn our Ultimate boot CD (mhdd is under the diagnostic tools btw) and fire it up.
Select your locked disk (1 usually) and let’s ask IDENTIFY to the bugger. Yes, that’s way too much info.

The first thing to look for is the 8th bit in the 128th word, 0 is security=high, 1 is security=maximum.

If it’s zero we’re in luck, and we can either unlock the disk with the regular password (assuming you know it, I did not) or with the master password (you can find some of them on the net, just google for your model number). (edit: I’ve collected the passwords I’ve found here)

Let’s type UNLOCK, and reply 1 when asked [that means we’re using the master’s password], and enter our password.
If we do not get an error [ERR turns red on the top of the screen] we’re good to go, if we do there’s 4 more tries with the password before we need to powercycle the disk.
If we get the password right a DISPWD (followed by 1 and the password again) will stop all this locking nonsense for good.

Oh, right, there’s maximum security too.
Well, that’s more satisfacting if slow as a glacier.
Just send an ERASE PREPARE followed by an ERASE UNIT and after an hour or so you can go and DISPWD it for good. Yes that will erase it completely, told you it was more satisfacting.

list of interesting stuff from identify:

  • bit 8 in word 128: security, 0=high 1=maximum
  • word 92: if it’s 0xFFFE the master password is unchanged (and you could get lucky and find it on the net)
  • words 89 and 90: how long will it take to ERASE the disk
  • word 88: which kind of dma the disk supports
  • byte 2 in word 53: wheter the fields in word 88 are valid or not (wtf?)

list of interesting links:

Happy disk hacking everyone

tags for the spiders: how-to howto unlock a password protected hard disk hdd