Quote:
Originally Posted by Logseman
Is there a way for me to extract the firmware files being in WVista? In the case that couldn't be, could someone post the firmware english version?
|
Hacking time!
Step 1.
install third party application poterm - terminal emulator for PocketBook
Step 2.
Make yourself familiar with the very, very basic Unix commands ls, pwd, cd, cp, df
Code:
ls - list the contents of the directory. If there is no parameter list contents of current directory, otherwise list directory that follows the ls command. Example ls /mnt/ext1
pwd - print (give on screen) name of current directory
cd - change the current directory
cp - copy file. In our case cp * /mnt/ext1 copies all files from current directory to /mnt/ext1 directory (here is mounted what you see as contents of the main memory when you connect PocketBook to the PC)
df - print where various partitions are mounted. I have used this to find out where the "main memory" partition is mounted
Step 3.
Start terminal emulator and enter following commands
Code:
/bin/ash: can't access tty; job control turned off
BusyBox v1.12.2 (2009-01-04 17:45:10 EET) built-in shell (ash)
Enter 'help' for a list of built-in commands.
$ pwd
/
$ ls
bin
dev
ebrmain
etc
lib
linuxrc
lost+found
mnt
proc
sbin
sys
tmp
usr
var
$ cd ebrmain
$ ls
bin
config
fonts
fsimage.tar.gz
language
lib
logo
lost+found
pocketbook
share
themes
$ cd lang
/bin/ash: cd: can't cd to lang
$ cd language
$ ls
by.txt
cz.txt
de.txt
ee.txt
en.txt
es.txt
fr.txt
he.txt
keyboard
lt.txt
lv.txt
ru.txt
ua.txt
$ df
Filesystem 1k-blocks Used Available Use% Mounted on
rootfs 8192 6156 2036 75% /
/dev/root 8192 6156 2036 75% /
none 24576 20 24556 0% /tmp
none 4096 12 4084 0% /var
none 4096 0 4096 0% /dev
tmpfs 31684 0 31684 0% /dev/shm
/dev/mtdblock5 32768 32768 0 100% /ebrmain
/dev/mtdblock6 477896 371248 106648 78% /mnt/ext1
/dev/mmcblk0p1 994944 898688 96256 90% /mnt/ext2
$ ls /mnt/ext1
2009_11_10_test
2009_11_24
2009_11_30
2009_12_10
2010_01_12
2010_01_20
2010_02_02
2010_03_02
Photo
Test CZ
e
games
notes
screens
system
$ cp * /mnt/ext1/
cp: omitting directory 'keyboard'
$ exit
The above listing is log of my entire hacking session.
I love Guys From Kiev. They strive to make our lives easier. Unlike the vast majority of other device manufacuters.
Step 4.
Connect PocketBook to the computer and copy desired files from the main memory.
The poterm log file is in directory /games - where the poterm.app is located.
Step 5.
Upload zip file with extracted files to Mobileread ;-)