Anyway im just here to see what we have in the way of software exploits... I dont mean completed exploits just anything possible full stop (no protection against that method).
Also just putting it out there should anyone need a guinee pig for software exploits im open (untill i jtag of course)
Ps: I wasnt sure if i should post this here or not... Decided to put it here anyway as even after reading the post warning it still seems like the right place to put it.
Edit: just incase anyone is curious its an opus with a hitachi-lg drive (thank you find out what drive you have tut that included chipset via power port)
Edited by Thedragonfiend, 21 June 2012 - 12:35 PM.