Tool to Insert/Replace SLIC in Phoenix / Insyde / Dell / EFI BIOSes

Discussion in 'MDL Projects and Applications' started by andyp, Nov 26, 2009.

  1. Mister Smith

    Mister Smith MDL Novice

    Feb 19, 2012
    9
    0
    0
    The Dynamic method is automatically suggested by the tool, I think because the BIOS has SLIC2.0 inside.

    I've modded now one BIOS with RW-Report and one without and the result are two BIOS with the same CRC. So why does the tool asks me, if I really wanna go on without a RW-Report, as it's not needed?
     
  2. Tito

    Tito Super Mod / Adviser
    Staff Member

    Nov 30, 2009
    18,827
    19,046
    340
    Yah... dummy AMI SLIC 2.0 ;)

    R/W report is optional for most of the EFI's; but some others (Phoenix, Dell) need it. As this is an universal tool, so it incorporates the option of asking the user about r/w report. :)
     
  3. ericgl

    ericgl MDL Senior Member

    Mar 10, 2011
    252
    189
    10
    Where can we get v1.97? The first page still says v1.96.
     
  4. ChrisSli

    ChrisSli MDL Novice

    Mar 14, 2012
    3
    0
    0
    Hi,

    Can the tool be used for modification HP ProBook 5330m bios (ver. F22) ? I heard there were problems with ProBook/EliteBook bioses.
    Guys from whitelist-removal threads concluded there is no an ability to patch modern probook/elitebook bioses at this moment.
    Also I would to know which patch should be applied to HP flashing utility in order to have moded bios flashing succeed? (and why the patch actually needed?)
    Also, what about a cryptography around these bioses? Should I know something important about that or tool handle it itself?

    Would be grateful for any help.
    Thank you,
    Chris
     
  5. tushen

    tushen MDL Novice

    Mar 27, 2009
    14
    0
    0
    thanks

    :biggrin:thanks a lot.
     
  6. Tito

    Tito Super Mod / Adviser
    Staff Member

    Nov 30, 2009
    18,827
    19,046
    340
    Try to disable AV & try again :)
     
  7. Andrew2

    Andrew2 MDL Novice

    Nov 8, 2009
    14
    16
    0
    Encountering the same problem - file access to 'TEMP.MOD' denied (Phoenixtool196, DMI method) - on Win7/64 Ultimate SP1, disabling the AV for me was not the solution. Configuring all .EXEs in the Phoenixtool directory for "run this program as an administrator" (file properties / Compatibility) did solve the issue, though.

    And, by the way, my sincere thanks to AndyP for the great tool and of course to Tito and all the other unpaid advisers for their ongoing support! :thumbsup:
     
  8. tushen

    tushen MDL Novice

    Mar 27, 2009
    14
    0
    0
    thanks a lot.
     
  9. Ryanclow

    Ryanclow MDL Novice

    Apr 6, 2010
    25
    2
    0
    Do how Andrew2 said, but still get that error :waycon1:
    v1.96, Dynamic, Maximus-IV-Extreme-Z-ASUS-3203
     
  10. qtm

    qtm MDL Addicted

    Jul 8, 2009
    640
    605
    30
    hi,
    BIOS HOME member feedback, for asus mobo UEFI bios,some latest bios ver.3xxx don't use phoenixtool196/new module method to mod,when u flash to mobo sometime still don't have slic or seriously brick,be careful to use this method

    qtm
     
  11. andyp

    andyp SLIC Tools Author

    Aug 8, 2008
    1,673
    2,570
    60
    What methods work??
    Could u give a specific example??

    Andy

     
  12. sebus

    sebus MDL Guru

    Jul 23, 2008
    6,384
    2,037
    210
    Would you happen to have modde A18 BIOS?

    Thanks

    sebus
     
  13. tedappleberry

    tedappleberry MDL Novice

    Feb 22, 2012
    14
    0
    0
    Wow.. Just read a chunk of this thread and am a bit overwhelmed.. Can somebody point out the definitive info for me trying to get my Dell Poweredge R510 SLIC happy? I have installed Server 2008 R2 on it in a on production environment.
    Thanks!
     
  14. Andrew2

    Andrew2 MDL Novice

    Nov 8, 2009
    14
    16
    0
    The problem definitively is caused by one or several of the 'security features' in NT 6.1 (Windows 7 / Server 2008R2).

    As I'm not interested in a religious debate I'm just listing what works for me on my servers and workstations (trying to turn the OS from a censor into a service provider for applications like it was in the old days):

    1) UAC completely disabled
    2) 'Administrator' account enabled & password protected
    3) IE 'enhanced security' disabled
    4) gpedit.msc: User Configuration / Administrative Templates / Windows Components / Attachment Manager / 'Do not preserve zone information in file attachments' = enabled (gets rid of blocked executables because 'from potentially unsafe' sources, files already tainted 'unsafe' need to be backup'ed/restored to/from a FAT32 medium to become clean again, ADS removers don't work as this 'unsafe' label is undocumented and hidden & -furthermore - the OS often does not report the 'blockade')
    5) MS 'Defender' disabled

    Okay, sorry, I get carried away a bit.

    So: [1] and [4] may be at the root of your problem, elevated rights for executables ('run as administrator') of course may have to be applied also - even if you are a user with administrative rights (which I strongly suggest).

    Additional comment: To make the GUI usable I run 'Classical Shell' on all our systems.

    Hope that helps :)
     
  15. teknomeatpop

    teknomeatpop MDL Novice

    Aug 11, 2009
    8
    0
    0
    #2540 teknomeatpop, Apr 7, 2012
    Last edited by a moderator: Apr 20, 2017