Back in the days of "basic" we used to do this ourselves.
Maybe. Maybe not. There is the argument about enabling access to a stolen computer or stolen data. There is a legal way through Dell.
It is not a simple matter of building your own programmer. From your description, I would be surpised if you could do it.
when it's taken down to "machine" language, it's still all the same, computer technology hasn't really changed on that level since i was a child doing this.
as for building a programmer, there are plenty of components available everywhere to make this simpler than it was 20 years ago. The only real difference between now and then is that things have gotten smaller and faster... base language, still the same, things still work in hex and assembly and even still no machine can resist binary no matter what it is.. just reminding everyone of our roots
I realize this thread is most likely dead, i can't figure out which of the millions of places to post is the "correct" thread now, but it seems as though there is a slightly complex crypto algorithm perhaps based in hex or maybe not,
I will have to work backwards to break down from beginning to see if there is correlation.
I'll start with a huge number system that uses 36 digits per character (ie; 0-9 and a-z) then break it down to hex, or simply start with the info in raw form converted to hex and then try some backwards crypto formula solving to get where i need to go. Sure i could take out the chip, build a programming socket, reprogram it (using ancient languages mind you) and carefully put it back in, but, i KNOW there is a formula, i'm tired of people hassling others and paying incredible amounts of money for a knowledge which should always be free.
of course you all realize that none of this i will ever finish because even as a youth, i suffer from terrible attention disorders that won't allow me to finish one project at a time.
When i DO finish this, you will all be the second to know (when i find the correct/current thread to post on)
thanks for letting me vent, hopefully it was in the correct form and correct place
as for the other thing about bypassing security hardware/software, possession is still 9/10ths of the law even when it comes to repossesion of vehicles/computers/etc. there are some of us out here who somehow legitimately got swindled or challenged with no recourse but to find our own solution. I don't know how to be helpful to the solution w/out being an enabler
Moderator Edit:
Free Help Here:
https://www.techspot.com/vb/topic90285.html
.