Otherwise in v1.5.3.4 you can enable netcatmon by adding a registry key:
Code: Select all
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\SamyGOPVRDecoder]
"ENABLENETCATMONITOR"=dword:00000001
Code: Select all
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\SamyGOPVRDecoder]
"ENABLENETCATMONITOR"=dword:00000001
Code: Select all
Connecting to 192.168.1.215:21 .. Success
Querying recordings on TV ...
Verifying telnet access to 192.168.1.215:23 .. Success
All recordings on USB listed. Waiting for user.
Dropping DRMDecrypt to work-folder.
Examining DRM status for file ...
Uploading / Executing KeyDropper .. ..
Unable to retrive 20141228152412.key. No point in continuing copy-process..
Process FAILED somewhere down the road for 20141228152412.srf.
Removing DRMDecrypt from work-folder..
All recordings on USB listed. Waiting for user.
Operation finished .. Waiting for user..
Code: Select all
(23) ---> cat /.version > /mtd_rwcommon/PVRDecoder.msg
(23) <--- "Echo.P 0091" KERNEL MODULE VERSION : "0081.0701, DTV, Echo.P, release, DEU_BRANCH"
(23) ---> df | grep -E "dev.*sd" | awk '{print ""X""$1"",""$2"",""$3,""$4,""$5""}' | sed 's/\/dev\///g' > /mtd_rwcommon/PVRDecoder.msg
(23) <--- sda1 15416320 10183000 5233320 66%
(21) ---> NOOP
(23) ---> df | grep -E "dev.*sd" | awk '{print ""X""$1"",""$2"",""$3,""$4,""$5""}' | sed 's/\/dev\///g' > /mtd_rwcommon/PVRDecoder.msg
(23) <--- sda1 15416320 10183000 5233320 66%
(21) ---> NOOP
(23) ---> df | grep -E "dev.*sd" | awk '{print ""X""$1"",""$2"",""$3,""$4,""$5""}' | sed 's/\/dev\///g' > /mtd_rwcommon/PVRDecoder.msg
(23) <--- sda1 15416320 10183000 5233320 66%
(23) --> hexdump -C -n 8 /dtv/usb/sda1/CONTENTS/20141228152412.srf > /mtd_rwcommon/PVRDecoder.msg
(23) <--
(23) --> /mtd_rwcommon/samyGOso -p $(pidof exeTV || pidof exeDSP) -l /mtd_rwcommon/libPVRdumpkeys.so
(23) <--
(23) ---> df | grep -E "dev.*sd" | awk '{print ""X""$1"",""$2"",""$3,""$4,""$5""}' | sed 's/\/dev\///g' > /mtd_rwcommon/PVRDecoder.msg
(23) <--- sda1 15416320 10183000 5233320 66%
(21) ---> NOOP
(23) ---> df | grep -E "dev.*sd" | awk '{print ""X""$1"",""$2"",""$3,""$4,""$5""}' | sed 's/\/dev\///g' > /mtd_rwcommon/PVRDecoder.msg
(23) <--- sda1 15416320 10183000 5233320 66%
(21) ---> NOOP
(23) ---> df | grep -E "dev.*sd" | awk '{print ""X""$1"",""$2"",""$3,""$4,""$5""}' | sed 's/\/dev\///g' > /mtd_rwcommon/PVRDecoder.msg
(23) <--- sda1 15416320 10183000 5233320 66%
I thought hexdump existed only in latest, no?Lordbyte wrote:@erdem_ua,
Did you try a newer SamyGO version ?
I kinda wanna know how it works out for you
Uhm, thats the PVRDecoder (1.5.3.4)zoelechat wrote:I thought hexdump existed only in latest, no?Lordbyte wrote:@erdem_ua,
Did you try a newer SamyGO version ?
I kinda wanna know how it works out for you
The one "from SamyGO Download area" is v1.5.3.4 so obviously both have been tried
Code: Select all
....
Examining DRM status for file ...
Recording is DRM protected
Uploading decoder library to TV
Removing any old work log
Starting the decoding process on TV
Waiting for TV to produce progress feedback
Lade 1,50 Gb von 1,50 Gb ..
File successfully retrieved.
...
Code: Select all
Examining DRM status for file ...
Recording is DRM protected
Uploading decoder library to TV
Code: Select all
USB listed. Waiting for user.
Dropping DRMDecrypt to work-folder.
Uploading / Executing KeyDropper .. ..
Unable to retrive 20591030113747.key. No point in continuing copy-process..
Process FAILED somewhere down the road for 20591030113747.srf.
Removing DRMDecrypt from work-folder..
All recordings on USB listed. Waiting for user.
Operation finished ..