Jump to content

LinsPirat v1.0 |5233|5230 (LinsPirat LTS to be released) by tintinboss


tintinboss

Recommended Posts

  • Replies 202
  • Created
  • Last Reply

Top Posters In This Topic

Sorry

Awesome work tintin :)

Just got time to visit your thread today....I was been busy with my classes !!!

BTW, screenshots (other than forum attachments) are not displaying.

Some suggestions:

1. Fix the "Options" menu text to the belle icon.

2. remove center text (this would make the real feel of belle), here is the link to do this task: http://forum.gizmolord.com/modding-section/remove-center-text-mod-from-c6v40c6v41n97v30/

3. It would be fine if you attach Maximum Python setup file here. Users will really find it difficult to get the working setup of this file from searching google.

I really loved the graphic work of this great cfw. Icons are supercool and unique.

And yeah, I always laugh/smile reading your descriptions. For example: IF YOU HAVE ANY TECHNICAL QUERY, JUST KNOCK ME AND I WON'T ANSWER (cos they wont make ur phone faster). LOL :D

And a question:

The accel swith icon is not for accel switch. Rather it will rotate your screen permanently until you press that again ( WORKS ONLY WHEN SENSOR IS OFF - LOGICAL right?).

Which app is this ?

Hey thanks mate :)

Nice to have complements from you.

Permanent rotate app - PhoneRotate

Okay, I'll upload maximum python :)

Link to comment
Share on other sites

TO ALL : Guys I had net problems from morning. I'm re-uploading the files with

-- CENTER TEXT MOD REMOVED

-- OPTION REPLACED WITH BELLE

-- FOR "5800XM" , "Nokia 5530" - (X6 next)

A BIG THANKS for appreciation :)

superb..

N please gimme files so that i can also hav belle bar for options n for removing centre text

Link to comment
Share on other sites

My JAF is OK because I can flash ither CFW properly except this one  :'( JAF log : JAF version 1.98.62 Detected PKEY: 9000AAC9 Card life counter: 99.99% P-key nokia module version 01.02 FBUS INTERFACE NOT CONNECTED!!! USB Cable Driver version: 7.1.48.0 Changing mode...Done! FILES SET FOR FLASHING: MCU Flash file: NONE PPM Flash file: NONE CNT Flash file: NONE APE Variant file: NONE Searching for JAF saved location of ini... Checking path: C:\Program Files\Nokia\Phoenix\Products\RM-356\ Searching for default location of ini... Checking path: \Products\RM-356\ Searching for JAF saved location of ini... Checking path: C:\Program Files\Nokia\Phoenix\Products\RM-356\ Scanning ini files... Searching for default location of ini... Checking path: \Products\RM-356\ Checking path: C:\Program Files\Nokia\Phoenix\Products\RM-356\ FILES SET FOR FLASHING: MCU Flash file: C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_prd.core.C00 PPM Flash file: C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_prd.rofs2.V05 CNT Flash file: C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_C01_prd.rofs3.fpsx APE Variant file: C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.001_026_000_U01.uda.fpsx Languages in ppm: English,German,Hungarian,Ukrainian,Russian,Romanian,Bulgarian Detected P-KEY: 9000AAC9 P-key nokia module version 01.02 Init usb communication... PRESS POWER ON NOW! Searching for phone...Found Sending RAW loader... Using —øÍž012.005     Elf2flash 09.11.000     CMT RAW loader... Patching RAW boot step1... Patching RAW boot step2... Patching RAW boot step3... Sending RAW Loader... ....................Loader Sent! Stage 2 starting..................PUBKEYS already sent... PUBKEYS already sent... PUBKEYS already sent... PUBKEYS already sent... PUBKEYS already sent... ...........Phone prepared OK! Waiting for the phone to boot... Searching for phone... Status byte: 8000 Selecting CMT flash... Result: 0000 Phone is in flash mode... CMT blocks: 665, APE blocks: 0 Erasing cmt... Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_prd.core.C00... Erasing cmt zone 00040000 - 00082FFF ... Erase result: 0000 Erasing cmt zone 00083400 - 003FFFFF ... Erase result: 0000 Erasing cmt zone 00400000 - 007FFFFF ... Erase result: 0000 Erasing cmt zone 00800000 - 00D5FFFF ... Erase result: 0000 Erasing cmt zone 00D60000 - 09E5FFFF ... Erase result: 0000 Partition result: 0014 Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_prd.rofs2.V05... Erasing cmt zone 02C60000 - 09D5FFFF ... Erase result: 0000 Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_C01_prd.rofs3.fpsx... Erasing cmt zone 09D60000 - 09E5FFFF ... Erase result: 0000 Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.001_026_000_U01.uda.fpsx... Erasing cmt zone 09E60000 - 0F47FFFF ... Erase result: 0000 Send CMT CFG... Writing cmt... Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_prd.core.C00... Sending CMT HASH for ADA Sending CMT HASH for KEYS Sending CMT HASH for PRIMAPP Sending CMT HASH for RAP3NAND Sending CMT HASH for PASUBTOC cmt->PAPUB_CERTIFICATE_DATA_BB5 block detected cmt->PAPUB_CERTIFICATE_DATA_BB5 block detected, sending... cmt->PAPUB keys already sent... cmt->PAPUB keys already sent... cmt->PAPUB keys already sent... cmt->PAPUB keys already sent... Sending CMT HASH for SOS*UPDAPP Sending CMT HASH for SOS*ENO Sending CMT HASH for SOS*DSP0 Sending CMT HASH for SOS*ISASW Sending CMT HASH for SOS+CORE Sending CMT HASH for SOS+ROFS1 Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_prd.rofs2.V05... Sending CMT HASH for SOS+ROFS2 Write result 27: 1701 Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_C01_prd.rofs3.fpsx... Sending CMT HASH for SOS+ROFS3 Write result 27: 1701 Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.001_026_000_U01.uda.fpsx... Rebooting... Finishing CMT session... Restarting CMT... Pooling phone... MCUSW: V ICPR72_10w29_tube1 24-05-11 RM-356 © Nokia APESW: V 60.0.003 VariantSW: V 60.0.003 Prodcode: 0573797 Done!

Link to comment
Share on other sites

My JAF is OK because I can flash ither CFW properly except this one  :'(

JAF log :

JAF version 1.98.62

Detected PKEY: 9000AAC9

Card life counter: 99.99%

P-key nokia module version 01.02

FBUS INTERFACE NOT CONNECTED!!!

USB Cable Driver version: 7.1.48.0

Changing mode...Done!

FILES SET FOR FLASHING:

MCU Flash file: NONE

PPM Flash file: NONE

CNT Flash file: NONE

APE Variant file: NONE

Searching for JAF saved location of ini...

Checking path: C:\Program Files\Nokia\Phoenix\Products\RM-356\

Searching for default location of ini...

Checking path: \Products\RM-356\

Searching for JAF saved location of ini...

Checking path: C:\Program Files\Nokia\Phoenix\Products\RM-356\

Scanning ini files...

Searching for default location of ini...

Checking path: \Products\RM-356\

Checking path: C:\Program Files\Nokia\Phoenix\Products\RM-356\

FILES SET FOR FLASHING:

MCU Flash file: C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_prd.core.C00

PPM Flash file: C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_prd.rofs2.V05

CNT Flash file: C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_C01_prd.rofs3.fpsx

APE Variant file: C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.001_026_000_U01.uda.fpsx

Languages in ppm: English,German,Hungarian,Ukrainian,Russian,Romanian,Bulgarian

Detected P-KEY: 9000AAC9

P-key nokia module version 01.02

Init usb communication...

PRESS POWER ON NOW!

Searching for phone...Found

Sending RAW loader...

Using —øÍž012.005

    Elf2flash 09.11.000

    CMT RAW loader...

Patching RAW boot step1...

Patching RAW boot step2...

Patching RAW boot step3...

Sending RAW Loader...

....................Loader Sent!

Stage 2 starting..................PUBKEYS already sent...

PUBKEYS already sent...

PUBKEYS already sent...

PUBKEYS already sent...

PUBKEYS already sent...

...........Phone prepared OK!

Waiting for the phone to boot...

Searching for phone...

Status byte: 8000

Selecting CMT flash...

Result: 0000

Phone is in flash mode...

CMT blocks: 665, APE blocks: 0

Erasing cmt...

Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_prd.core.C00...

Erasing cmt zone 00040000 - 00082FFF ... Erase result: 0000

Erasing cmt zone 00083400 - 003FFFFF ... Erase result: 0000

Erasing cmt zone 00400000 - 007FFFFF ... Erase result: 0000

Erasing cmt zone 00800000 - 00D5FFFF ... Erase result: 0000

Erasing cmt zone 00D60000 - 09E5FFFF ... Erase result: 0000

Partition result: 0014

Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_prd.rofs2.V05...

Erasing cmt zone 02C60000 - 09D5FFFF ... Erase result: 0000

Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_C01_prd.rofs3.fpsx...

Erasing cmt zone 09D60000 - 09E5FFFF ... Erase result: 0000

Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.001_026_000_U01.uda.fpsx...

Erasing cmt zone 09E60000 - 0F47FFFF ... Erase result: 0000

Send CMT CFG...

Writing cmt...

Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_prd.core.C00...

Sending CMT HASH for ADA

Sending CMT HASH for KEYS

Sending CMT HASH for PRIMAPP

Sending CMT HASH for RAP3NAND

Sending CMT HASH for PASUBTOC

cmt->PAPUB_CERTIFICATE_DATA_BB5 block detected

cmt->PAPUB_CERTIFICATE_DATA_BB5 block detected, sending...

cmt->PAPUB keys already sent...

cmt->PAPUB keys already sent...

cmt->PAPUB keys already sent...

cmt->PAPUB keys already sent...

Sending CMT HASH for SOS*UPDAPP

Sending CMT HASH for SOS*ENO

Sending CMT HASH for SOS*DSP0

Sending CMT HASH for SOS*ISASW

Sending CMT HASH for SOS+CORE

Sending CMT HASH for SOS+ROFS1

Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_prd.rofs2.V05...

Sending CMT HASH for SOS+ROFS2

Write result 27: 1701

Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.003_C01_prd.rofs3.fpsx...

Sending CMT HASH for SOS+ROFS3

Write result 27: 1701

Processing C:\Program Files\Nokia\Phoenix\Products\RM-356\RM-356_60.0.001_026_000_U01.uda.fpsx...

Rebooting...

Finishing CMT session...

Restarting CMT...

Pooling phone...

MCUSW: V ICPR72_10w29_tube1

24-05-11

RM-356

© Nokia

APESW: V 60.0.003

VariantSW: V 60.0.003

Prodcode: 0573797

Done!

bro, don't use the rofs3 :P
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...

×
×
  • Create New...