diff --git a/templates/pages/sega/software/security/index.html b/templates/pages/sega/software/security/index.html index fef591a..393492f 100644 --- a/templates/pages/sega/software/security/index.html +++ b/templates/pages/sega/software/security/index.html @@ -32,8 +32,6 @@

This can be bypassed either by extracting the password used, or by first powering on the Ring* system with the drive connected, then hotplugging the SATA data cable on the drive while keeping the drive powered.

-{% markdown %}{% include relative("~ata.md") %}{% endmarkdown %} -
Why does this work?

The following is the sequence of possible security modes for an ATA drive:

@@ -254,6 +252,45 @@

This allows us full read-write access to the drive without ever knowing the password!

+{% markdown %}{% include relative("~ata.md") %}{% endmarkdown %} + +

Generate drive passsword:

+ + + + + + + + + +
Model number:
ATA password:
+ + +

Windows Password

It seems silly to mention, but it's worth noting. AppUser will automatically log in, but if you need to log back in, or wish to login as SystemUser, you'll need the passwords.