Stealth patching an iso (ABGX 1.0.5) W/pics | GBAtemp.net
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
Tutorial
DISCLAIMER
This tutorial is to be used with games that you personally own. I do not encourage piracy, nor do I think its fair to be banned for playing a copy of a game you purchased with hard earned cash. Using this tutorial does not guarantee you will not be banned, but dramatically raises your chances of staying live capable.
I have noticed that there are not to many tutorials to be found on how to use this program. In most cases it is self explanatory, but if you are new to backing up xbox 360 games this can be a somewhat complicated task. It is important to have your games properly stealth patched to avoid getting your valuable console banned from connecting to xbox live services.
So lets begin…
Tools or items required:
— An xbox 360 with a modified Disc drive flahed to the most recent LT/LT+ 1.9 firmware.
— A PC or Laptop with a Dual layer DVD burner & 8Gb’s of free hard drive space
— Blank DVD+R DL http://www.newegg.com/Product/Product.aspx…N82E16817130080
Go to abgx360.net and download the program or click the link below:
http://hotfile.com/dl/120516168/eecce19/ab…_setup.exe.html
Virus scan: http://www.viruschief.com/report.html?repo…5995af83a8a6ae0
This is the ABGX GUI «Graphical user interface» It is a simple program and all the settings are saved and do not need to be set again.
Step one:
Change all the settings like in the following 3 images below.
Click the Options tab
Click the AutoFix tab
Click the Misc tab
Press CTRL+S or click File, Save Settings… and press enter or click OK
Your settings are now saved for the next time you open the program.
Step two:
Download the SS and DMI files that correspond to the games iso. To do this click here: http://abgx360.net/verified.php look for your game on the list or do a search. Click the small number on the far right hand side of the game name, right next to the wave just like in the picture below. Click here for more details in text only: http://paste2.org/p/635626
Manually patch your iso file. Change all the settings like in the following 3 images below.
Click the Manually Patch or Extract Files tab and open your iso, change the following settings.
You must do the following as their is a bug in the program and your image will no patch properly.
Launch the program to start patching your game
Let the program run. Once complete close ABGX and re open it, open your iso file and launch it again.
Look to see if you have correctly patched it, if so you should have all green text! make sure that your image is patched the same as the one in the picture below. The part in the orange box only applies to ap2.5 games. This is a list of games that are ap2.5: https://spreadsheets.google.com/pub?key=0Am…cF9JSWs3VmhBNXc
Step three:
Burn your game
You will be left with a 7.2Gb iso file and a small dvd file. Put both of the files into a folder and burn the dvd file with your favourite burning software at 2.4x or 4x write speed. If your not sure how to tell the iso and the dvd files apart, right click one of the two files and click properties, it will give you the file type and size.
Enjoy your Game…
Click to expand…
The Composer
Well-Known Member
-
-
#2
I do not own an Xbox and I’m completely ignorant about the scene and the console itself.
But this tutorial looks very good and I think it should be pinned.
rasputin
Well-Known Member
-
-
#3
Alternatively, install, load up your iso and hit the launch button.
someonewhodied
Lazy Person
-
-
#4
rasputin said:
Alternatively, install, load up your iso and hit the launch button.
Click to expand…
You still have to check off the settings the first time. Then just load and launch.
Altair skin for Prince of Persia 2008, plus a bonus
- cagerhager
- Microsoft Xbox 360
- Replies
- 4
- Views
- 873
Microsoft Xbox 360
Kouji_kun
Hacking Homebrew Tutorial
How to make 60FPS .ips Patch for Nintendo Switch Game Ghidra Tutorial
- ChanseyIsTheBest
- Nintendo Switch
- Replies
- 4
- Views
- 1K
Nintendo Switch
masagrator
Tutorial
Custom Boot Logo Tutorial
- binkinator
- Nintendo Switch
2
- Replies
- 37
- Views
- 5K
Nintendo Switch
binkinator
Tutorial
Recovering Games Saves from *NAND using NXNandManager and JKSV
- binkinator
- Nintendo Switch
2
- Replies
- 25
- Views
- 6K
Nintendo Switch
binkinator
Tutorial
Retroarch Wiiflow Plugins: independent cores and pixel perfect scanlines
- Tetsuo Shima
- Nintendo Wii
- Replies
- 17
- Views
- 2K
Nintendo Wii
JuanBaNaNa
Share:
Facebook
Twitter
Reddit
Pinterest
Tumblr
WhatsApp
Email
Share
Link
- No one is chatting at the moment.
-
@The Real Jdbye:
+1
-
@Aki_Akira:
hoy >.<
-
@SylverReZ:
Hi
-
@K3N1:
https://youtube. com/shorts/rYIcISXOUdM?feature=share
+2
-
@dygeo:
Hello
-
@dygeo:
how do we see who has viewed the photos on our personal page
-
@SylverReZ:
https://atari. com/products/akka-arrh
-
@SylverReZ:
Have you all seen this yet?
-
@SylverReZ:
Atari is re-releasing the long lost «Akka Arrh» arcade game onto modern platforms.
-
@SylverReZ:
https://www. polygon.com/23613576/jeff-minter-profile-akka-arrh-atari-llamasoft-arcade
-
@theveryhbread:
hi again
-
@Psionic Roshambo:
Texas Road house is busy as hell lol
-
@SanZhu:
你们好
-
@SanZhu:
很高兴认识大家
-
@x65943:
我也很高兴认识你
-
@x65943:
no one speaks chinese here tho, so you should use english. I only speak a little
-
@SanZhu:
I will study hard
+1
-
@Psionic Roshambo:
https://www.toyota.com/configurator/build/step/model:grade/year/2023/series/gr-supra/model/2387/ I need this lol
-
@K3N1:
Having a midlife crisis?
-
@ZeroT21:
get a midlife fling
-
@Sonic Angel Knight:
-
@Sonic Angel Knight:
-
@ZeroT21:
-
@ZeroT21:
bewbmon, I choose you!
@ZeroT21:
bewbmon, I choose you!
Chat 0
Stealth patch | GBAtemp.
net — The Independent Video Game Community
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
R2DJ
Well-Known Member
OP
-
-
#1
Can anyone describe to me how this works? My friends are asking me if I want to «stealth patch» my 360. Although I don’t want to, I’m a bit intrigued. How does it work exactly?
I’ve done some googling and found that stealth patching is done so you don’t get caught by MS when you’re playing an ISO. Isn’t it that you will still be banned even if you stealth patch?
Will you recommend it to me? I regularly play online, download games, add-ons and other stuff from the marketplace and use services like YouTube, BBC on my 360?
I’m also aware of the XGD3 format on some of the newer games on the 360. Can they be stealth patched too?
Would appreciate some clarity.
Tom Bombadildo
Dick, With Balls
-
-
#2
Well first off, you don’t stealth patch your 360, you stealth patch your ISOs and it is essential to ensure the safety of your account. Although it’s not 100% guaranteed to help protect you from a ban, it definitely helps a TON.
To go about doing so, you need to find and install abgx 1.0.6. AFAIK most XGD3 games can be patched successfully, so that should be no worries. All you need to do is load the ISO in abgx, change a few settings if necessary, then stealth patch them. Easy as that.
EDIT: I believe it’s ok to post the link to abgx so…here’s the website http://abgx360.net It’ll tell you all you need to know about stealth patching.
DinohScene
Gay twink catboy
-
-
#3
XGD3 games can be patched yes.
The topology data is patched so you won’t have to repatch and reburn every ISO with every update.
It will require either LT 2.0 or LT 3.0.
ABGX Settings: here
Once you’ve patched it you’ll have to burn it with an iHAS drive at 2.4x speed with OPT disabled or at 4x with OPT enabled.
Hacking
How Do I Set Breakpoints on Xbox 360 Games?
- ReclaimerShawn
- Microsoft Xbox 360
- Replies
- 2
- Views
- 362
Microsoft Xbox 360
TheStonedModder
Best method running OG XBOX games on xk3y
- simbin
- Microsoft Xbox 360
- Replies
- 2
- Views
- 622
Microsoft Xbox 360
simbin
360 VS One
- ISO-Man
- Microsoft Xbox 360
- Replies
- 6
- Views
- 600
Microsoft Xbox 360
WiiMiiSwitch
Hacking
xbox360 slim 120mm fan mod + fan override + no dvd /internal external hdd mod
- rantex92
- Microsoft Xbox 360
- Replies
- 4
- Views
- 878
Microsoft Xbox 360
rantex92
My project, a gamestop modded Jasper 360
- me_man
- Microsoft Xbox 360
- Replies
- 4
- Views
- 568
Microsoft Xbox 360
me_man
Share:
Facebook
Twitter
Reddit
Pinterest
Tumblr
WhatsApp
Email
Share
Link
- No one is chatting at the moment.
-
@The Real Jdbye:
+1
-
@Aki_Akira:
hoy >.<
-
@SylverReZ:
Hi
-
@K3N1:
https://youtube. com/shorts/rYIcISXOUdM?feature=share
+2
-
@dygeo:
Hello
-
@dygeo:
how do we see who has viewed the photos on our personal page
-
@SylverReZ:
https://atari. com/products/akka-arrh
-
@SylverReZ:
Have you all seen this yet?
-
@SylverReZ:
Atari is re-releasing the long lost «Akka Arrh» arcade game onto modern platforms.
-
@SylverReZ:
https://www. polygon.com/23613576/jeff-minter-profile-akka-arrh-atari-llamasoft-arcade
-
@theveryhbread:
hi again
-
@Psionic Roshambo:
Texas Road house is busy as hell lol
-
@SanZhu:
你们好
-
@SanZhu:
很高兴认识大家
-
@x65943:
我也很高兴认识你
-
@x65943:
no one speaks chinese here tho, so you should use english. I only speak a little
-
@SanZhu:
I will study hard
+1
-
@Psionic Roshambo:
https://www.toyota.com/configurator/build/step/model:grade/year/2023/series/gr-supra/model/2387/ I need this lol
-
@K3N1:
Having a midlife crisis?
-
@ZeroT21:
get a midlife fling
-
@Sonic Angel Knight:
-
@Sonic Angel Knight:
-
@ZeroT21:
-
@ZeroT21:
bewbmon, I choose you!
@ZeroT21:
bewbmon, I choose you!
Chat 0
How to remove the correction area in Word
In collaborating on text documents today, users actively use the feature of making registered changes. It is located in the «Review» section of the settings menu. Its use allows you to make edits and comments that will be seen by another user who has opened this file. The author of the document can accept or reject these notes and instructions from other people working on the file, hide or show them. In any case, you should check in the text for corrections that are not displayed, so as not to accidentally send, for example, by e-mail to another person.
At the same time, in addition to the actual edits, Word also supports such a feature as comments. They are located directly in the editing window and are visible only when the display of the review area of the text file is enabled. They cannot be accepted or rejected, and there is really only one option for the person working on the file: when they are not needed, the notes are simply deleted. Their function is simple: if an edit made by another person requires clarification, then the user also creates a note in this place. Then the author of the document will not puzzle over the motivation of the ruling party, and the work will obviously be more productive.
Change mode in Word
To enable, as well as remove, the display of the correction area in Word, you should find the «Review» tab in the top line of the Settings Ribbon and click on the button with the corresponding inscription. There is an arrow at the bottom of this icon, which means that by clicking on it, a drop-down list will open, in which you can choose to display the review area. After that, you can make corrections, as well as insert comments into the text, and anyone who opens this file will see them, and the creator of the document can accept or reject them. If you are the author of this text, then you just need to do this.
Sometimes such recorded changes are hidden when you open a text file in a word processor. Then you have to enable them from the same menu. Next to the button of the same name there will be an item «Tracking». By clicking on it, you will receive a drop-down list in which you will need to mark all the proposed items. After that, the searched elements will be displayed in full in the editing window. Actually, if you want to display not all the changes made and recorded, then select only the items that interest you in this menu.
How to remove the review area
You can remove all changes in a document in Word, as they say in the official Microsoft documentation, by turning on their display, accepting or rejecting each of them. If you have done everything that we have described above, then the first part is already done. Now in the review menu, click on the «Next» button. The corresponding area will be highlighted in the editing window, and next to the button you just clicked, you will see the options «Fix» and «Reject». If the selected fragment was a note, then the button will be one, «Delete». Actually, this is how, in turn, accepting each correction or rejecting it, in the Word you will remove them all.
However, sometimes there are voluminous texts in which there are too many such areas. Or, let’s say, for you in the process of work, each of the changes made and comments made earlier ceased to matter. In this case, clicking through each of them can be a chore, so Microsoft Word developers have provided the ability to automate this process. Each step will be identical to those described above, only at the end of the process, when you are already starting to accept each element you are looking for, you need to select the drop-down menu to the right of the corresponding button. In it, the user can click on the “Apply all corrections in the document” item, and then the displayed and hidden marks in the text will be marked as accepted. Actually, in order to remove each of them, you need to act exactly the same way, that is, find the arrow to the right of the «Reject» button, click on it and select the «Reject all corrections» item.
Please note that in order to remove comments as well, you will need to carry out the corresponding procedure with any comment in the same menu item. Please note that in this mode, you will mark each of the changes and notes made, and not just those that are displayed in the selected mode. In this case, the selection will move around the screen and «highlight» the area that you are currently editing.
Afterword
When working with text fragments in Word, it should be taken into account that for ease of reading, the author or other users could make the notes and comments made hidden from other authors. Since, by default, a word processor won’t display these things when you open a file you’ve received from another user, you may not know they’re there until you turn them on. Accordingly, before working with it or transferring it somewhere, you should check for the presence of peer-reviewed areas, and if there are, accept or remove them from the text. In Word, this is done with just a couple of mouse clicks.
That being said, you should remember that there is only one way to protect your edits from prying eyes: make copies. The fact is that any user can remove corrections and notes from a Word document, since there is no distributed editing model in this word processor, this would be too much complication of the model. Therefore, if you want to create notes and edits for yourself only, then create a separate copy for yourself. But this approach has a drawback, because then you have to keep track of changes in the copy that you left for public use.
Silent Data Corruption Protection
The silent data corruption protection mechanism used in RAIDIX allows you to detect and correct hidden errors during normal disk operations by analyzing checksums, without performance loss.
DESCRIPTION (PDF)
Scanning and fixing latent errors is performed by the system in the background while reading data from clients.
Application
Silent data corruption is the erroneous modification of data on a drive, usually due to subtle software or hardware errors. On the hardware side, data integrity violations occur due to the wear of hard disk mechanisms, damage to data transmission channels, power outages, etc. Errors in the software layer occur due to existing problems in the code of operating and file systems, as well as in the firmware of adapters and drives.
The main problem is that such errors are not identified at the software level — if the RAID array has all the disks in place, then it does not check the data for integrity. This causes incorrect data to be passed to the application and the application to produce an incorrect result.
How it works
The mechanism implemented in RAIDIX detects and eliminates hidden data corruption right in the process of reading it from the drive. The system reads the required data and their corresponding checksums, compares their values and, based on this, evaluates the integrity of what was read from the disk.
Thanks to unique computational algorithms for recovering data from checksums, such operations occur with virtually no performance loss. It is also possible during low system load to run a forced scan of the entire storage volume for hidden damage. In this case, the mechanism can automatically correct these errors, or send a notification to the user. The urgency of the problem of hidden data corruption is increasing due to the increase in storage volumes and the increase in storage capacity.
Identification and correction of latent errors occur
with virtually no performance loss
Technology features
Protection against latent data corruption allows you to identify and eliminate hidden errors during normal disk operations by analyzing checksums. At the same time, the identification and error correction operations occur with virtually no performance loss.
This technology can only be used on initialized RAID arrays. The silent data corruption protection mechanism cannot be used at the same time as the predictive reconstruction feature.