Hehehe...
Hehehe...
2005 Silverado Duramax LLY - EFI Live Tuned
1969 Chevrolet C-10 Pickup - Turbocharged 5.3L/4L80E - EFI Live Tuned
1975 Avenger Jet Boat - 6.0L/Berkley pump - EFI Live tune in progress
Here's a couple more.
The last one is my current one...my two loves, haha.
Last edited by Wasted Income; November 28th, 2007 at 04:05 PM.
2005 Silverado Duramax LLY - EFI Live Tuned
1969 Chevrolet C-10 Pickup - Turbocharged 5.3L/4L80E - EFI Live Tuned
1975 Avenger Jet Boat - 6.0L/Berkley pump - EFI Live tune in progress
Very nice, how about one with the Corvette crossed flags?Originally Posted by Wasted Income
Paul
Before asking for help, please read this.
++UPDATED++
Enjoy. (I am a Photoshop nut)
Any requests, let me know.
Last edited by Goldfinger911; November 29th, 2007 at 10:23 AM.
2002 WS6, All-Lunati 383 Strok'r @11:1, Cartek Heads, Keith/Ross Racing Custom Cam, Victor Jr., 492whp 457wtq,
Cartek Clutch, 9" Moser w/4.11's, 35 spline Detroit Locker, QA1's, NX, BMR, Tuned w/ EFILive V2 Black Box Logging
Check Out My Latest Tune File: HERE
Decepticon.bmp
Conspiracy.bmp
Anarchy.bmp
Moates.bmp
out of curiosity, is it possible to down load a virus to the V2?
Last edited by mr.prick; March 25th, 2008 at 06:04 PM.
Yeah just try and read a HPTuners custom os tune......... :pOriginally Posted by mr.prick
Technically yes. But practically, its not even remotely possible (I'm not throwing out a challenge by the way).Originally Posted by mr.prick
Depending on your definition of a virus, anything other than the official EFILive FlashScan firmware could be classed as a virus (sometimes even our beta firmware behaves as badly as a virus ).
There are safeguards built into FlashScan that prevent unauthorized code from executing in FlashScan.
1. The flash memory is locked with a 64 bit key. Assuming someone could try 1000 keys per second, it would take about 250 billion years to try just half the possible combinations. And that's not taking into account that aftger each unsuccessful attempt, the CPU must be cold booted.
2. If the key was cracked (and it is different on each FlashScan device), the firmware must adhere to a number of constraints, including magic 32-bit numbers embedded in random parts of the code and multiple 16 bit CRC values.
3. The virus writer would need to have knowledge of the inner workings of the FlashScan RTOS. None of that is available outside of EFILive.
So there really is no practical way a virus or any other non-official EFILive code (or code damaged by faulty hardware) could execute on the FlashScan device.
Anytime FlashScan detects the firmware has been modified/damaged in any way, it will go into deadpoll mode and flash the two orange LEDs (assuming it is not too brain-dead to do even that simple task). So you will know if anything has been modified/damaged.
By the way, those safeguards were not put in place to protect against viruses but were put in place to detect a failure of the flash memory and to prevent FlashScan from operating if any single bit in the flash memory was altered or damaged.
Regards
Paul
Before asking for help, please read this.
That didn't take long....Originally Posted by Wasted Income
Before asking for help, please read this.