Pentru a instala oscam pe SmartTV Samsung seriile E/F avem nevoie de acces root prin metoda SamyGO.
Rooting widget for F series TV
Download:
1. Widget: Samygo http://yadi.sk/d/GxEVmjPu7ukxk
2. data file: http://yadi.sk/d/zElgQFCY7ulzy
Installation
1. Install skype widget and start it once (check if it starts correctly)
2. Make sure Skype is set to autostart, before closing Skype again.
3. Download archive data and extract it "as is" to root of fat32 USB, attach to TV.
4. Install widget SamyGO (trough develop account in SmartHub)
5. Start SamyGO widget
6. Press Enter. If you get both Step1 and Step2 OK, then hack is installed.
7. Power off and power on TV
8. Check ftp (port 21) and netcat (port 23 or 1023) connections.
Dupa instalare SamyGO trecem la instalarea oscam pentru asta avem nevoie de un FTP client si Putty instalate pe PC, fisierele de configurare, librariile si executabilul se afla in:
/mtd_rwcommon/oscam
fisiere necesare:
- oscam
- fisiere configurare oscam(config,user,server...)
- libOSCAM.so #v.3
- samyGOso
- samyGOrc #necesar pentru autoswitch channels
- ntpclient
- kill-samyGOoscam
- list_smargo
- samyGOoscam #scriptul de pornire este remodificat cu autozapp down/up/down astfel avem imagine in 18 secunde dupa pornire TV [tks @rromcic]
Code:
if [ "$(pidof ${OSCAM})" == "" ]; then
echo Starting oscam
${BIN_OSCAM} -c ${DIR_OSCAM} -t ${DIR_OSCAM} &
sleep 1
${BIN_SAMYGORC} -p $INJPID 18 16
sleep 1
${BIN_SAMYGORC} -p $INJPID 16 18
else
se modifica in /mtd_rwcommon/widgets/user/SamyGO/data fisierul run.sh linia 18 sleep = 0(default = 60)
Code:
sleep 0
/mtd_rwcommon/oscam/samyGOoscam
configurare dvbapi:
[dvbapi]
enabled = 1
pmt_mode = 6
user = dvbapi #la alegere
boxtype = pc
comenzi Start oscam telnet:
Code:
cd /mtd_rwcommon/oscam
chmod +x samyGOso oscam ntpclient
chmod +x /mtd_rwcommon/oscam/samyGOoscam
/mtd_rwcommon/oscam/samyGOoscam
Fisiere necesare:
oscam-1.20-unstable_svn9514-arm-v7a8v3r1-linux-gnueabi-libusb-static-samygo.zip
- smartreader 1802 si 0500 stabil
- nu suporta procese emm (WIP)
- nu suporta recording.
---------- Post added at 22:04 ---------- Previous post was at 21:24 ----------
/mtd_rwcommon/widgets/user/SamyGO/data/run.sh
Code:
#!/bin/sh
cd /tmp
mkdir /tmp/bin
/mtd_exe/InfoLink/lib/unzip -o -P 12345 /mtd_rwcommon/widgets/user/SamyGO/data/data.zip -d /tmp/bin/
chmod 777 /tmp/bin/*
/tmp/bin/busybox --install -s /tmp/bin
sync
export PATH=/tmp/bin:$PATH
export LD_LIBRARY_PATH=/tmp/bin:$LD_LIBRARY_PATH
sync
/tmp/bin/busybox tcpsvd -vE 0.0.0.0 21 /tmp/bin/busybox ftpd -w / &
/tmp/bin/remshd &
sync
/tmp/bin/UEP_killer.sh &
sleep 0
/mtd_rwcommon/oscam/samyGOoscam
sleep 5
ps | grep run.sh | grep -v grep | while read child_pid others
do
echo "Killing child process $child_pid of run.sh"
kill -9 $child_pid
done
---------- Post added at 15:26 07.07.2014 -------------------
07.07.2014 UPDATE
The new firmwares block the root permanently!!!
- T-FXPDEUC-1118 (F7xxx/F8xxx)
- T-MST12DEUC -1120 (F5xxx/6xxx)