here what i did like you told me
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.89 Beta (284)
Session Started Tue Nov 08 16:48:04 2011
This is a 32 bit process running on a 32 bit CPU
X360USB PRO detected, Version 0.18
Found 1 I/O Ports.
Found 2 Com Ports.
Found 4 windows drives A: C: E: G:
Found 1 CD/DVD drives E:
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Loading firmware file C:\Documents and Settings\tarek\Desktop\keysss\tweet86 slim 0225\Dummy.bin
MD5 hash: 07b33156ee1f8ebcf84a57ad733fb306
Inquiry string found
Identify string found
Drive key @ 0xA030 A230C8657D57E97A698C454FDE987539
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: SlimKey Extract
Loading firmware file C:\Documents and Settings\tarek\Desktop\JungleFlasher v0.1.89 Beta (284)\firmware\LTPlus-0225-v2.0.bin
MD5 hash: 1012021472620cad9adf1f838497668e
Genuine LT plus v2.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: LT-Plus 2.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Sending Lite-On-Erase request to port 0x0000
..............
Drive returned Status 0x80
..........
Getting Status from port 0x0000
Invalid Status 0x80
..
Device Intro failed!
Sending Vendor Intro to port 0x0000
Status 0x80
Re-sending Vendor Intro:
.....................................................Sending Vendor Intro to port 0x0000
Status 0x80
Re-sending Vendor Intro:
....................Spoofing Target
DVD Key already matches
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Serial data already matches
....................................................................................................................
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x8C
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
..
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x8C
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Sending Spi UnLock request to Port 0x0000
.........
Spi Status: 0x00
Getting Status from port 0x0000
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Write verified OK !
Sending Spi Lock request to Port 0x0000
Spi Status: 0x8C
Sending Spi UnLock request to Port 0x0000
Sending Vendor Outro to port 0x0000
Sending Vendor Outro to port 0x0000
Drive is Slim Lite-On..
Key found in KeyDB at record (34 - tweet tx pcb)
Key is: A230C8657D57E97A698C454FDE987539
Key has been tested and verified, thanks C4eva !
Sending Vendor Outro to port 0x0000
Drive is Slim Lite-On..
Key found in KeyDB at record (34 - tweet tx pcb)
Key is: A230C8657D57E97A698C454FDE987539
Key has been tested and verified, thanks C4eva !
Sending Vendor Outro to port 0x0000
Drive is Slim Lite-On..
Key found in KeyDB at record (34 - tweet tx pcb)
Key is: A230C8657D57E97A698C454FDE987539
Key has been tested and verified, thanks C4eva !
the same error m8 play dvd firsdt original then backup