Saturn Posted September 22, 2014 Report Share Posted September 22, 2014 Hi, let's say hypothetically, I wanted to use a .ABS file from a game demo and convert it to an encrypted CD. Assuming I'm on the right track, is there an easy way to determine if the .abs has a Header? I'm trying to follow Matthias' encryption process and down the page under Step 2 it says, "The file-extension "ABS" would indicate that "HV.ABS" has a header which need to be removed" but there's no guide to accomplishing this since his is (apparently) a regular binary with the abs extension. Link to comment Share on other sites More sharing options...
Zerosquare Posted September 22, 2014 Report Share Posted September 22, 2014 You don't need to bother with that. Download ULS by Reboot and you'll be able to convert your .ABS game to a burnable CD image with a few clicks. Link to comment Share on other sites More sharing options...
Saturn Posted September 22, 2014 Author Report Share Posted September 22, 2014 You don't need to bother with that. Download ULS by Reboot and you'll be able to convert your .ABS game to a burnable CD image with a few clicks. Thanks, I've actually used it for quite a bit of conversions in the recent past and it's an invaluable tool, to say the least. But, I'm trying to go old school with some of the methods, like JUGS recently, and even though ULS is incredible, I'd like to convert the files I'm testing without the splash screen. Is it possible to disable the splash? Or perhaps use a custom one? Link to comment Share on other sites More sharing options...
Cyrano Jones Posted September 23, 2014 Report Share Posted September 23, 2014 Is it possible to disable the splash? Or perhaps use a custom one? Yes to both, but we'd have to re-create the custom image that the binary is injected into. ULS2.0 is 'on my plate' which will allow multiple binaries, a sort-of filesystem, and optional splash screens, but atm I really don't have the time to look into this. Link to comment Share on other sites More sharing options...
Zerosquare Posted September 23, 2014 Report Share Posted September 23, 2014 To answer your original question, you can use JiFFI to autodetect if your file has a header, and generate a BIN file without the header if this is the case. If it doesn't, then simply change the file extension to BIN. Link to comment Share on other sites More sharing options...
Saturn Posted September 23, 2014 Author Report Share Posted September 23, 2014 @Cyrano Jones, thanks for the info. If/when you get 2.0 complete, I'll be the first in line @Zerosquare, I had no idea (go figure ) it was that simple. Thanks once again for your help Link to comment Share on other sites More sharing options...
Saturn Posted September 27, 2014 Author Report Share Posted September 27, 2014 To answer your original question, you can use JiFFI to autodetect if your file has a header, and generate a BIN file without the header if this is the case. If it doesn't, then simply change the file extension to BIN.Hi, I used JiFFI to convert the file to BJL then changed it to BIN. Using the info here and here, I've created/tested the unencrypted cd. My settings in HyperTerminal match the ones on the page but the Retries field just counts up after Transfer-Receive via Xmodem. I verified the serial port works with JUGS and double checked the pinout on my 'Matthias adapter' against all the available info. It looks perfect so I'm struggling to find a reason as to why the communication is failing. Has anyone used this encryption method and run into a similar problem? Is there a user created guide for setting up TeraTerm with specific Jag transfer settings? (so I can troubleshoot whether outdated HyperTerminal is a factor) The videos and tutorials I've seen all make HyperTerminal setup a cinch. That tells me I probably have the pinout wrong on the adapter (as was the case with JUGS, but there was no info for JUGS.) There's a lot with Matthias' and the resource where I got my parts so, like I said, struggling.. Any help is appreciated Link to comment Share on other sites More sharing options...
Saturn Posted September 27, 2014 Author Report Share Posted September 27, 2014 Wow, nevermind, the JUGS device worked like a champ. Wondering what the deal is with the specific pinout from Matthias? Must be differences in the signaling for the U.S. Jaguars. Anyway, just accomplished my first encryption process All the info I've found and the re-written instructions I've compiled open doors for the Cinepak test I was working on and reluctantly abandoned. Will be posting a n00b version of my notes as soon as I edit them down to a reasonable length. Link to comment Share on other sites More sharing options...
Cyrano Jones Posted September 28, 2014 Report Share Posted September 28, 2014 No need to mess around with serial adapters and term packages if you have a skunkboard: http://reboot.atari.org/new-reboot/skunkryptor.html Link to comment Share on other sites More sharing options...
Saturn Posted September 29, 2014 Author Report Share Posted September 29, 2014 That looks pretty cool. I have 3 Skunkboards w/ 3 more arriving shortly. Might dive in and try to work up a how-to on it soon as well, but I'm having too much with all this older stuff atm. I like compiling and creating easily understood resources for the things that were out of reach before. You all sure simplify things though and it's much appreciated After Googling around, still have no definite info as to why the pinouts don't work but a lot of the data I found is over my head anyway. Burned upwards of 30 disks yesterday (15 encrypted, usable game disks) and this technique is awesome, now that it works. Wish there was more PD to go around Without trying to cross any lines, is there a way to encrypt a previously unencrypted disk data without the original files? Also without the tools or knowledge of hacking because I don't know jack about that. I couldn't even rip the sound files from a JagCD disk recently, just a lot of high pitched squealing that made me look like this guy--> (forgot to turn the speakers down) Probably a can of worms but I'm interested in learning, if possible. Link to comment Share on other sites More sharing options...
Cyrano Jones Posted September 29, 2014 Report Share Posted September 29, 2014 Without trying to cross any lines, is there a way to encrypt a previously unencrypted disk data without the original files? Also without the tools or knowledge of hacking because I don't know jack about that. If the disc is in the correct format (multisession, CD audio for session 1, track 1 - then a boot loader on session 2 track 1 followed by the tracks) then yes. You can rip all the tracks in RAW mode, then create the security track, append it to the end of session 2, and reburn it. Link to comment Share on other sites More sharing options...
Saturn Posted September 30, 2014 Author Report Share Posted September 30, 2014 How exactly to rip all the tracks in RAW mode? Can this be done with CDex? Link to comment Share on other sites More sharing options...
Cyrano Jones Posted October 1, 2014 Report Share Posted October 1, 2014 How exactly to rip all the tracks in RAW mode? Can this be done with CDex? No idea if CDex can do this - most ripping applications can. If I remember correctly, I used IsoBuster. Link to comment Share on other sites More sharing options...
Saturn Posted October 2, 2014 Author Report Share Posted October 2, 2014 No idea if CDex can do this - most ripping applications can. If I remember correctly, I used IsoBuster. There sure are a lot of choices in Isobuster You wouldn't happen to recall the exact selections you made? I'm looking at File-CD-Extract CD <Image>-RAW (*.bin, *.iso) as a logical path but the outcome would be saved as an .iso. Wouldn't have the faintest clue what to do with "CD.iso & CD.cue" from there. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now