1.13
- fixed bug where target device unable to boot property in specified conditions.
- minor changes.
1.13a
- added support/compatibility for any 64bit Microsoft OS
1.13b
-fixed false possitive issue reported by \"Avast!\" which claimed that our Tool is a Win32:Trojan-gen. {Other}
1.13c:
- fixed false positive wave which confusing most of AV software. (all AV do not report any problems anymore)
- fixed 3 minor bugs:
* after finished work the tool do not quit normal as expected and hang instead, that happend in x32bit OS only when used has been asked for reboot and answered with \"No\". e.g. in described specified case.
* 4th mainboard filter report positive results in some Biostart mainboard and this cause tool to false ID some Biostar board as MSI one.
* added missing drive letter as USB key choice (\"I\")
1.13d
-fixed issue with Symantec AV false ID as \"unknown virus\".
-cosmetic changes: one message appear early when asking for USB key drive letter to input and in same time user has been asked to locate BIOS file, and may confuse user. corrected.
1.14
- when user must choice the BIOS file archive, after that the Tool will investigate user choice and if its invalid(filename of path name) will notice user about it and to retry with newest selection, instead to terminate without notice.
- adding a new way of USB Drive device parameters detection system which boost detection speed up to 500% on the large storage\'s or heavy fragmented volumes.The current way of detection will be used for backup option and will be activated only when the 1st detection got a failure. e.g. the current existing procedure just in case will be used as backup option, but will be activated only if the 1st one got a failure. also added a bar indicator of % completed task
-- adding Auto Detection system for USB Drives connected to the system, but the tool will not perform at his own based on the result. reason for that is that user may have more than one USB key connected in same time, or user may preffer to use some other storage with FAT or FAT32(not USB one, which is also supported by the Tool). The detection will be only as recommendation and to be more comfortable and easy when user need to choice the USB drive letter
- adding feature about user to point directly to the BIOS file. it will be usefull when user flashing Beta BIOS or just got BIOS file only.
The Tool will examine user choice and will auto determinate what kind of BIOS is it and will take care about it with corespond further actions.
Also if user choice some other file which is not a BIOS file the Tool will know that and will notice the user that the file inserted is everythink else but not a
valid BIOS file.
- improved user interface with Gui Mode
- improved user dialog in x64bit OS, and Vista.
- improved compatibility when working in restricted accounts.
1.14a
Minor changes
1.15a.
* Added Build-In BIOS Live Update Feature, named as \"SureHands\". The Tool will ID the exactly user board and PCB version and will provide choice to user for do you want to use this feature. after is done the Tool will list all existing BIOS versions for his board, not only the latest one like LiveUpdate do. because users often should go back to the some older version to solve some problem.(the newest one is not always best). so user will have choice which one to pickup. depend of user choice the Tool will do everything automatically.
Also the Tool will automatically check for latest Beta BIOS available for his board and will record the results in user desktop in file betabios.txt
That is informative info only, the Tool will not provide any option to download any betas. only will check for latest Beta BIOS which exist for user\'s board.
If user have interest to some betas he will be redirected to Contact to MSI Tech for more info about it.
Here is the list of supported boards by SureHands for now(later in time can be added more...):
975X Platinum PowerUp Edition (MS-7246, PCB 2.1)
K8N Diamond Plus( MS-7220, PCB 1.0)
865PE Neo2-P Platinum Edition (MS-6728, PCB 2.0C)
K8N Neo4-F (MS-7125, PCB 3.0)
K8NGM2-FID (MS-7207, PCB 2.0)
P35 Neo Combo-F ((MS-7365, PCB 1.0))
P35 Neo2 Series ((MS-7345, PCB 1.1))
P35 Platinum ((MS-7345, PCB 1.1))
P35 Neo-F ((MS-7360, PCB 1.0))
P6N Diamond ((MS-7320, (PCB 1.0)))
P6N SLI Platinum MS-7350 (PCB 1.0)
P6N SLI-FI MS-7350 (PCB 2.0)
P6N SLI V2 MS-7346, (PCB 1.0)
P965 Platinum MS-7238, (PCB 1.1)
K9A Platinum MS-7280, (PCB 1.0)
K9N Neo-F (MS-7260, PCB 1.0 & 2.0 )
K9VGM-V (MS-7253, PCB1.0)
K9N Platinum & K9N SLI Platinum(MS-7250, PCB1.0)
K8N Neo3 (MS-7135, PCB 1.0 & 2.0)
* Also the Tool has a prediction system which will be able to locate the BIOSes which has not been released yet when the Tool version is out.
In that way it will remove the needs of Tool to be selfupdated to be actual. e.g. the Tool will be up to date at any time for desired board without needs program to be updated 1st.
This feature will works even if MSI web is down for some reason(maintenance for example), and also it will provide all BIOS choices even if they are not available for manual download from MSI web page.
In a fact the user just need to pickup desired BIOS version and that is.... everythink will be done automataically and prepared to the USB key.(the flash will remain in a same way e.g. via pure DOS, reboot PC and boot from the USB key)
OS Compatible for SureHands: all kind of Microsoft OS 32 or 64 bit
1.15d:
* Fixed cosmetic bug: SureHands LU wrong shows P965 Platinum as P6N SLI V2
* Few Minor cosmetic changes.
* Fixed bug: SureHands LU in Vista ignore user choice, and auto pickup latest BIOS version for user board.
* SureHands LU: BIOS range extended for K9A Platinum, P965 Platinum, P35 Platinum/Neo2 Series, P6N SLI V2, P35 Neo Combo.
* Newest board supported by SureHands LU:
K9A2 Platinum
X38 Diamond Plus
X38 Diamond
X38 Platinum
K9A2 CF-F
* added support for RAR archives, Tool now can proceed RAR files along with ZIP.(downloaded from here
http://ftp://duser:duser@66.232.110.239/ for example)
1.16:
* Fixed bug in section W22CR2L7, condition 14 may receive error message \"Can\'t perform requested operation\" in Vista x64
/* The issue is minor can come in the specified condition in very very rare case, only when target drive is \"W\" */
* Live Update Sure Hands:
- BIOS range extended for P35 Neo-F
- BIOS range extended for P6N SLI Platinum
- BIOS range extended for P6N SLI-FI
- Handle improved for P6N SLI Platinum and P6N SLI-FI
- Added support for X48 Platinum
- Handle improved for X38 Diamond Plus/Diamond/Platinum and X48 Platinum
* Improved method for output redirection
* Shows basic info at start-up with MSI mainboard model and PCB version to the user.
* Better filter for flasher detection with new sections added for most precision operation
* Improved compatibility with older flashers
* Added prevention against BIOS refuse to save(keep) settings after BIOS update, which can happend in rare case
(Note: That issue can occur with all kind of BIOS flashing methods: MSI Live Update, Afuwin, Recovery procedure, DOS flashing. It has nothing to do with the Tool, its not bug in a Tool or something. And to be resolved, second reflash is necessary.
The Tool will prevent this issue to come)
* Added verbose message that BIOS update is completed and notice user that he can reboot computer now
* Added detection if MSI want to use specific flasher\'s switches for specific mainboard and BIOS, they will be applied automatically and override default tool mode.
(That means improvement for notebook BIOS flash)
[Installer only update] * Added user information instruction screen during setup installation
[Installer only update] * Added forgotten shortcut to executable Tool file in a StartMenu Program folder \"MSIHQ USB Bootable Tool and BIOS Helper\"
1.17:
* Method 3 Sure Hands {
Added support for:
* P7N Diamond (MS-7510, PCB 1.0) /* BIOS range 1.0 - 1.9 */
* P7N SLI Platinum (MS-7380, PCB 1.0) /* BIOS range 1.0 - 1.9 */
* P7N2 Diamond (MS-7523, PCB 1.0) BIOS Range 1.0 - 1.9
* EFINITY-FP (MS-7395(E), PCB 1.0) {Using EFI BIOS} /* BIOS range 1.0 - 1.9 */
* K9N2 Diamond (MS-7375, PCB 1.1) BIOS Range 2.0 - 2.9
* K9N2 SLI Platinum (MS-7374, PCB 1.0) BIOS Range 3.0 - 3.9
* K9N2 Zilent (MS-7374, PCB 1.0) BIOS Range 3.0 - 3.9
* G33 Platinum (MS-7345, PCB 1.1 & PCB 1.2) BIOS Range 1.4 - 1.9
* K9N Neo V2 / V3 (MS-7369, PCB 1.1) BIOS Range 2.0 - 2.9
* K9N2GM-F V2 (MS-7509, PCB 1.0) BIOS Range 1.0 - 1.9
* HydroGenX48C & X48C Platinum(MS-7353, PCB 3.0) BIOS Range 7.0 - 7.9
* Removed remark \"(May not exist yet)\" {Global}
}
* Added support for EFI BIOS based boards for Methods 1,2,3
* Added support for 16Mbit BIOS for Method 2
* 2nd Flasher for Method 2 updated to meet the new requirements
* Improved MSI OEM Mainboard detection
* Added verification if the user is trying to use the wrong Tool mode.
* Added detection for exFAT(Introduced and supported since SP1{March 2k8} for Vista)
* Added restriction for non MSI Mainboard in 64 bit OS too.
* Added USB key Geometry adjustment option. (Experimental feature for Vista only, NOTE: All data on the desired USB storage will be lost during operation. Use this option if you have troubles booting from USB Key)
{
- Checking for Vista.
- Checking for Administrative rights.
- Added strong verification for USB key geometry adjustment.
- Forcing USB storage as HDD Emulation for compatibility purpose.
}
* Keyboard LEDs now blinking by specified way while work is in progress.
* Instruction update, after BIOS update is finished procedure is halted with instruction to verify the screen for failure message. If such exist. There is instruction to do not reboot or shutdown PC and instruction to roll back to the old BIOS{Which Tool auto make backup before performing update}
* Added support for Phoenix BIOS used in Server boards for regular condition. (When capture switches filter is inactive)
* Beta BIOS query updated.
* Added support for Memtest86+, to check memory for basic failures which can harm the BIOS update.
Details:
Tool will auto install Memtest86+ from
http://www.memtest.org/ to the USB key when active Internet connection is available.
After booting from the USB key, the user will meet a screen to choose between:
1. Run Memtest86+
2. Proceed with BIOS update
1.17a:
Fixed the false positive alert \"Trojan-Proxy.Win32.Horst.ail\"
1.17b:
* Packer replaced to avoid future false positive AV alerts
* Few Cosmetic changes.
1.17c:
* Fixed bug in newest feature \"Fix USB key\", Path not defined
* Added support for 32Mbit BIOS for Method 2
* Removed time counter after booting from USB key, waiting for user input instead
1.17d:
* Beta BIOS query updated
* Download module updated
* Mode 3 {Live Update}, add-ed support for DKA790GX Platinum (MS-7550, PCB 1.1), BIOS range 1.0 - 1.9
* System Info query at start-up updated ==> {Mainboard Model, Mainboard PCB, Installed BIOS Version{new} and BIOS Date{new}}
* Minor fixes
1.17e:
* Live Update P35 Neo-F/P35 Neo-FI/G33 Neo-F , Mode 3 Prediction range extended 1.09 - 1.F0
{601-7360-010,601-7360-020,601-7360-030}
* Improved administrative rights detection for Mode 4 under Vista.{x86,x64}
1.17g:
* Minor changes.
* Add-ed self check function and self auto update feature.
1.17h:
* Memtest synchronization update, 2.01 ==> 2.11 (22/12/2008) {Tool will auto download and install Memtest 2.11 instead 2.01}
1.17j:
* Changed self update server
1.17k:
* Download engine updated.Mode 3 Live Update:
* Add ECLIPSE SLI (MS-7520, PCB 1.0) BIOS range 1.2 - 1.B0
* Add 790FX-GD70 (MS-7577, PCB 1.xx) BIOS range 1.0 - 1.9
* Add 790GX-G65 (MS-7576, PCB 1.xx) BIOS range 1.0 - 1.9 1.17k0e:
* Fixed incorrect year
* Mode 2, second flasher updated to v4.28b0.1
* Mode 3, fixed issue unable to detect as supported mainboard Eclipse SLI 1.17k0f:
* Minor changes
* Download engine updated
* Mode 3, fixed duplicate BIOS 1.3 appear for Eclipse SLI, 790FX-GD70 and 790GX-G651.17s:
* Minor changes
* Fixed error in download engine.
* Improved compatibility with Windows 71.17v:
* Minor changes
* Add-ed MSI Notebooks detection:

* Add-ed AC Main Power detection for MSI\'s notebooks:

If MSI Notebook is detected by the Tool,
it will perform check to ensure that AC Main Power is connected,
if its not it will make co-respond notice and will wait user to connect the AC Main Power,
else will refuse to continue, until user connect the AC Main Power or Exit:

* Once/when AC Main Power is detected,
Tool will make an reminder and notice about EC Reset that need to be done after BIOS update for notebooks:
New features has been tested on XP, Vista and Windows 71.17x:
* Mode 3 Live Update:
{
- Fixed detection issue with K9N2 SLI Platinum / K9N2 Zilent. Tool were expecting non existing PCB version.
- Improved detection for DKA790GX Platinum and DKA790GX due MSI BIOS Engineer\'s error.
Affected BIOS version 1.2:
/* Wrongly typed mainboard name by some MSI BIOS Engineer. */}
Also Tool now will expect further syntax errors by MSI BIOS Engineer{s} and will auto correct the name.
}
* Add-ed Auto Recovery if BIOS update fail.
{
Tool will perform two auto BIOS recovery attempts by using last known working BIOS which Tool auto take backup before perform the BIOS update,
if BIOS update failure is detected and will left control to the user if both attempts fails too for further attempts.
}1.17x9:* Minor changes.
* Limit selfupdate check to once per day.
1.18:
* Fixed small bug non functionality related
* New style icons for Installer and Stand Alone versions

* Mode 3, Live Update
- Add support for Eclipse Plus (MS-7566, PCB 1.0) BIOS Range 1.2 - 1.B0
1.18a:
* Mode 3, Live Update
- Add support for P35 Neo3-F (MS-7395, PCB 1.0) BIOS Range 1.4 - 1.D0
- Fixed detection issue for EFINITY-FP and EFI BIOS range extended to 1.4 - 1.D0
- [MS-7395, PCB 1.0] splited to two ver, depend of BIOS types used {Normal/EFI}
- Updated EFINITY-FP Beta BIOS query search arguments
1.18b:
* Add new feature USB Drive Geometry Adjust for XP /* Beta */
1.18c:
* Several fixes about newest feature \"Fix key for XP\".
1.18d:
* Fixed BIOS backup creation issue
1.18e:
* Updated beta BIOS query [sync update]
* Mode 3 Live Update[SureHands] ==> Fixed detection issue for P6N SLI-FI when onboard is installed BIOS V2.7
* Mode 2, Second flasher updated from v4.28b0.1 ==> v4.31
1.18f:
* Restore Administrative rights checking for USB Key adjust procedure â??2{Mode 5} for [x86 Vista, x64 Vista]
* Add workaround solution for x64 XP hang issue
* Disable Mode 2 usage for Notebooks
1.18g:
* Enable USB key Fix ability â??2 for W7[x86,x64]
1.18h:
* Optimize self update process for slow machines in Installer version
/* Stand Alone version is using different way to self update and such changes isn\'t necessary */
* Add new feature: EC version decoder for notebooks, shows as add-on at start-up information screen.
E.g: Mainboard, PCB, BIOS version, BIOS date, EC version{new}, EC date{new}
/* EC version and EC date will be shown For notebooks only */
1.18j:
* Fixed Admin rights detection issue for Vista/W7 for non US OS language, due language difference for geometry fix ability method 2.
1.18k:
* Fixed private case detection issues for x64bit OS
* Mode 3 Live Update[SureHands], Add support for newest MSI AMD Nvidia based AM3 boards:
- Add support for NF980-G65 (MS-7612, PCB 1.x) BIOS Range 1.1 - 1.A0
- Add support for NF750-G55 (MS-7578, PCB 1.x) BIOS Range 1.1 - 1.A0
- Add support for GF615M-P35|P31|P33 (MS-7597,PCB 1.x) BIOS Range 1.1 - 1.A0
1.18m:
* Mode 1 and Mode 2, Blacklisted BIOS version 1.9 for K9A2 CF-F and K9A2 Neo-F mainboards.
* Mode 3 LiveUpdate[SureHands]
- Removed BIOS version 1.9 for K9A2 CF-F and K9A2 Neo-F mainboards.
- Add support for BIOS version 1.A0 and prediction range extended to 1.C0 for K9A2 CF-F and K9A2 Neo-F mainboards.
* Flash boot part update
- Improved appearance.
- Improved user handle.
- Award BIOS based now support both award flasher writer algorithms and flash algorithms of the current BIOS version to reprogram the Flash ROM.
/* When Award BIOS is detected, Tool will ask for user input with default recommendation, The purpose is to handle private cases issues */
- Code optimization.
- Build and add new modules.[BKHB_04.EXE, BKUI_T6.EXE, BK_VER.EXE]
- Add support for Legacy <==> UEFI BIOS flash transformation and opposite.
- Add ability to reboot when BIOS update complete, asking user to reboot machine and proceed if positive answer is received.
* Tool\'s W32 part synchronized with changes listed above.
* Fixed few cosmetic issues.
1.18p:* Optimize boot part
* Mode3 Live Update[SureHands]
-Add support for MSI Wind Netbooks models U90/U100/U100+ , BIOS Range 1D0 - 1M0
1.18r:
* Memtest86+ synchronization update to the latest version 4.0 (22/09/2009) What\'s new? ==> http://www.memtest.org/#change
/* Tool will download and install latest Memtest86+ version */
Taken more attention to Memtest86+ and system stability,
since people don\'t read much and skip the instruction without read them and Memtest86+ probably is used by few persons.{It\'s not there for decoration}
* Updating bootpart
- Add new module BOOTBK.EXE
- Add detection if user was running Memtest86+ before proceed with BIOS update attempt.
If such test wasn\'t been performed yet, execution will halt :stop: and will shows warning notice about the risks following by recommendation
and offer Memtest86+ execution.


1.18s:
* Fixed few bugs, non functionality related
* Improved Tool preparation performance.
* Mode3 Live Update[SureHands]
- Changed Live Update server
1.18t:
* Updated download engine
* Mode 1, filter updated
* Mode 2, second flasher updated from 4.31 to 4.33
1.18v:
* Updated boot part
- updated text part, minor changes
- changed the way of backup determination to speedup process.[store up to 5 backups]
* Mode 4[Beta]
- clean up pnp filter before exit.
- restore system default if halt on error occur [cases: abort by user, drive query failure, drive not attached, drive validation failure{do not meet the necessary criteria to be proceed}]
* Mode 3, Live Update
- Fixed issue MSI Wind U90/U100/U100+, unable to be detected as supported unit if current BIOS version installed is older than 1.0D
- Add support for Big Bang-Trinergy , prediction BIOS range [1.1 - 1.A0]
Remark: Symantec/Norton user\'s, please update your virus definition to the latest one to fix/avoid \"Suspicious.MH690.A\" false detection issue.
--------------------
Version updated to 1.18z:
* Mode 3,[Sure Hands,LiveUpdate] Eclipse SLI prediction BIOS range extended to 1.J
* Mode 2,[Disabled for notebooks] Second flasher updated from ver. 4.33 to ver. 4.36
* Add a new security feature to check and ensure that target BIOS or EC-FW [or both] is not corrupted or modified by anyway compared to original input,
before attempt BIOS/EC flash. E.g to ensure that source image is authentic and not corrupted. [see * for details]
* Updated all Tool\'s modes to integrate the newest feature
* F.A.Q:
Q: I through that the flasher itself [From AMI/Award/ENE/Phoenix/MSI] have protection and will not flash the image if something is wrong with it,
if so what\'s the point of this extra check?
A: If we exclude M-Flash from the list, sure they have it.
However there are weakness places in the protection system and its not good enough:
* Not all section in the BIOS are protected [and flashers can\'t check them, are they good to go or not]
* From protected sections, flashers don\'t check all of them before flashing, but only some of them
Q: Can a corrupted BIOS to be flashed by flasher [From AMI/Award/ENE/Phoenix/MSI],
without problem?
A: Sure yes, but very depend of exact case and where exactly the corruption will strike.
Q: What is the effect of flashed corrupted BIOS or EC-FW?
A: As said above very depend of exact case, but speaking generally everything can happend.
Like unknown side issues[depend what exactly and how is corrupted]
But in most of cases the effect will be black screen[machine will no longer able to boot],
or machine can\'t be even turned on...[for notebooks only]
Q: Is there a different chance of vulnerability depend of firmware images if the corruption strike?
A: Yes, EFI based BIOSes and EC-FW are the most vulnerable if the corruption strike.
Which means mostly notebooks, but can happend with any other machines too just with less chance.
Q: I see in the supplied EC-FW archives and sometimes in BIOS archives supplied by MSI,
there is a CheckSum.txt file with listed checksum inside.
I can\'t figure how to get this number from the firmware image supplied to compare it with the number from the .txt supplied,
==> http://eu.msi.com/index.php?func=firmwarefile&dno=8767&i=0
1651_432.zip ==> CheckSum.txt ==> \"Check sum 1651EMS1.432=009FD301\"
If that can done and the checksum match, can i assume that i\'m secure and good to go?
A: You can use 32bit checksum generator tool to get it

However:
If that can done and the checksum match, can i assume that i\'m secure and good to go?
Not really, the purpose of this checksum is for reference only and not intended for security purpose.
See the example below, let\'s calculate 32bit checksum for the code below:
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF43122132A53EFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFFFFFFFFF
To get the 32bit checksum for the code above, we can perform the following calculation:
(67+18+33+50+165+62)+(304[see *]x255)=77915 ==> (0001305Bh)* ==> [
count all bytes with EQU values[0xFF] = (136-6)h]
So as you can see, the method is not good to check the image for corruption.
Because easy the same 32 bit checksum can be returned and image to be corrupted in mean time.
E.g easy authentic and corrupted images may have the same checksum,
/* Simple example you can move/rotate/swap any bytes of the code to any desired place{which will cause a corruption..},
and the checksum still will remain the same if you don\'t increase or decrease any values */
Both images will be flashed fine and result will be one of them[the corrupted one] will kill your machine.
In other words, this 32bit checksum do not guarantee that image is authentic and not corrupted or modified.
And the most important the vendor flasher doesn\'t check this checksum anyway while flash it.
So this checksum is useless in big % if its planned to be used for security purpose.Q:
How i can use the newest Tool security feature?A:
The newest Tool\'s feature is also full automatic and no user action is required.
You can flash the machine by the same easy way, with few clicks and and key confirmation when needs.[or to answer with \"Y\" or \"N\" if the Tool is asking for something]Q:
I want to flash the EC-FW for my notebook, but for my notebook model its separated from main system BIOS.
Does the new security feature will works in such case?A:
Yes, no problemQ:
How my image can become corrupted?A:
It can happend by many reasons:
* Corrupted FS on the target USB storage
* Faulty USB port
* Defective USB storage
* Compatibility issues between the specific USB storage and the mainboard\'s USB ports [will lead to IO read/write errors]
* System instability issues[memory related]
* File transfer error
* Un-authorized modification over the target firmware after preparation is complete
* Unknown factors
Example: http://forum-en.msi.com/index.php?topic=137699.0
By analyzing requested files, lucky for this case the corruption strike monitored protected BIOS section and trigger the flasher alert,
the Tool detect the failure too, and trigger internal recovery procedure too, but the backups just created before the flash was corrupted too.Q:
Does the newest security feature can safe my mainboard or notebook from bad flash?A:
Definitely yes. Test performed over MSI Wind U100:Without Tool\'s newest security feature:
After preparation i\'ve damaged the BIOS image on the USB key with sense to simulate corruption, [DO NOT TRY THIS AT HOME!!!]
then proceed with BIOS update.
Results: The image passed internal flasher protection and the image flashed without problems.
After that the Machine no longer boot, and can\'t even be turned ON. [Power button do nothing and has no effect]
The Machine become very well killed.
[As planned and expected]With Tool\'s newest security feature:Repeating the same steps as above, e.g:
After preparation i\'ve damaged the BIOS image on the USB key with sense to simulate corruption, [DO NOT TRY THIS AT HOME!!!]
then proceed with BIOS update.
Results: The newest security feature detect the BIOS image corruption and abort BIOS update operation.[Refuse to flash the BIOS]
Results: Your nice MSI notebook has been saved and protected from disaster if/when the corruption strike! :biggthumbsup:




Version Updated to 1.18z3
Changes:* Mode 3 Live Update, extent prediction BIOS range for P35 Neo2-FI, P35 Neo2-FIR, P35 Neo2-FR, P35 Platinum, G33 Platinum to 1.G
* Support Intel\'s flasher [target latest and future msi notebooks] + dynamic image detection for security validation
* Support ATI\'s VBIOS flasher + dynamic image detection for security validation Version available via Tool\'s self update feature.
Version Updated to 1.18z6Changes:* Memtest86+ synchronization update, 4.00 ==> 4.10 [04/05/2010] What\'s new? ==> http://www.memtest.org/#change
/* Tool will download and install latest Memtest86+ version */
* Add warning notice message during flashing process.

Version available via Tool\'s self update feature.
Version Updated to 1.18z9
Changes:* Mode 3 Live Update, add support for Big Bang-Fuzion prediction BIOS range up to version 1.A
* Updated Mode 2 Version available via Tool\'s self update feature.