Hacking The Xbox, Unlimited Edition. No Starch Press

An Introduction to Reverse Engineering

Andrew “bunnie” Huang

No Starch Press, Inc.
San Francisco

E-book Shop
Hacking The Xbox, Unlimited Edition

Acknowledgments
I would like to thank my dedicated and caring parents
 for raising me to be the person that I am today.
I would also like to thank the online hacking community for their advice
and guidance, especially those who must operate anonymously for fear of
persecution by government or retribution by their employer.
Lee Tien of the Electronic Frontier Foundation, Joseph Liu of the Boston
College Law School, and Dr. Tom Knight and Prof. Hal Abelson of the
MIT Artificial Intelligence Laboratory all deserve a special thanks for
helping me through the process of publishing my original paper on the
Xbox security system. I never would have published if it weren’t for their support and counsel.
I am also indebted to the Xbox-Linux team: Michael Steil, Milosch Meriac,
Franz Lehner (thanks for all the detailed technical review!), and the amazing
Andy Green (aka numbnut), for providing so much insight into the
latest Xbox hacks and for providing such interesting material for the book.
Mad props to you guys; keep up the great work. I would also like to thank
Dan Johnson (aka SiliconIce), founder of the XboxHacker.net BBS, for
starting the XboxHacker.net BBS and for his interesting material for the
book, and for his very helpful technical review, advice, and encouragement.
Also, thanks to Gerhard Farfeleder for contributing a photograph of the Xbox-Linux team.
Thanks to Timothy Chen of Via Technologies, Inc., for contributing the
P4M266 motherboard for the Xbox versus PC comparison and for his fascinating
insight into the PC industry. I would also like to thank Xilinx for their
generous FPGA donations through the Xilinx University Program.
You know who you are, and you know how you helped me: xor, adq, luc,
head, visor, roastbeef, kgasper, xerox, lordvictory, pixel8, El (GCN), tom from HK, and sween (Scotch!).
More thanks are due for the unlimited edition of this book: Bill Pollock of
No Starch Press deserves a special thanks for boldly stepping up to handle
the printing and distribution of the book; Paul Yoon deserves a hearty
thanks for his numerous typo corrections; and Rael Dornfast and Tim
O’Reilly of O’Reilly & Associates, Inc. also deserve a special thanks for
their helpful advice and encouragement.


PROLOGUE
README.1ST

The XboxTM video game console from Microsoft® is an exciting piece of
hardware, and not just because it can play the latest video games. The
powerful and cheap Xbox has the potential to be used as a PC, an all-in-one
media player, or even a web server. Unfortunately, there is a dearth of books
that can teach a reader how to explore and modify modern electronic
hardware such as the Xbox. Most electronics textbooks are theory-oriented
and very focused, whereas real hacking requires a broad set of practical skills
and knowledge. Also, the few practical books on hardware hacking that I
had as inspiration as a child have long been outdated by the fast pace of
technology. This book is intended to fill the need for a practical guide to
understanding and reverse engineering modern computers: a handbook for
a new generation of hackers.

 The ultimate benefit of hacking the Xbox is its educational value, or as the
saying goes, “Given a fish, eat for a day; learn to fish, eat for a lifetime.”
Hence, this book focuses on introducing basic hacking techniques —
soldering, reverse engineering, debugging — to novice hackers, while
providing hardware references and insight that may be useful to more
seasoned hackers. The Xbox has served to educate both the security
community and the hacking community: not because it is an outstanding
example of security, but because it is a high profile, high volume product
made by a large company whose focus was recently defined to be security
by its chairman.1 The Xbox experience shows that building trustable
clients in a hostile user environment is hard, even for a large, well-funded
company. One observation is that this risk and difficulty of building
cheap, trustable hardware clients places an upper bound on the importance
of the secret that can be trusted to such client hardware. In
addition, the Xbox provides a consistent teaching example, with almost
10 million nearly identical units out there at the time of writing. The
similarity of the Xbox’s architecture to a vanilla PC adds even more
educational value to Xbox hacking, since much of the discussion in this
book also applies directly to the much broader subject of PCs.

Another interesting aspect of Xbox hacking is the underground society
of hardware hackers following the Xbox. The people who hacked the
Xbox and the expertise they attained will be relevant long after the Xbox
has become a dusty yard sale piece. Hence, there is a conscious social
focus to this book. I have included profiles of a sampling of Xbox
hacking personalities. The hope is to inspire people, through role models,
to pick up a screwdriver and a soldering iron and to start hacking.
Instilling this sort of exploratory spirit in the younger generations will be
important in the long run for preserving the pool of talented engineers
that drove the technology revolution to where it is today. Many of
today’s engineers got their start hacking and tinkering with ham radios,
telephones and computers which, back in that day, shipped with a
complete set of schematics and source code. This pool of engineering
talent is essential for maintaining a healthy economy and for maintaining
strong national security in the computer age.

The Video Game Console Market

2002 was a year marked by turmoil, not only abroad, but also in the
technology marketplace; PC sales flattened, the server business shrank, and
the telecommunications market, with a few exceptions, looked dismal.
Despite the bear market for technology, the video game hardware, software
and accessories market had a landmark year, hitting a total dollar sales of
$10.3 billion — a 10% increase over 2001.2 This is comparable to the
recording industry’s sales of $13 billion in the US in 2001.

Even though the market for video games is large, running a profitable
console business is a daunting challenge. Video game customers are picky,
trendy, and frugal. They demand high-performance, sexy console hardware
at the price of a fancy family dinner or a visit to the doctor. This combination
of frugality with an expectation for high performance game hardware
forces console vendors to sell their hardware at a loss. As a result, a “closedconsole”
business strategy is used by console vendors: the console is sold as
a loss leader, and profits come from future sales of video game titles. This
business strategy requires a large amount of up-front investment in console
hardware and in advertising. It is the console manufacturer’s responsibility
to create a market for their hardware so that game developers feel comfortable
investing their time and money in the platform.

The Catch-22 is that nobody wants to buy a console that has few game
titles. Thus, the risk of building and deploying millions of units of
hardware, and the hundreds of millions of dollars of up-front losses
taken on the hardware, is shouldered almost entirely by the console
manufacturer. As a result, there are currently only three players in the
game console business today: Sony, Nintendo, and Microsoft. Of these
three, Sony has a head-and-shoulders lead in the console market, while
Nintendo has cornered the handheld market with its Gameboy line of
products. Microsoft is the new player in the game console market. The
race for second place is yet undecided. In early 2003, Gamecube sales
were leading Xbox sales in Japan and Europe, while the Xbox maintained
a sales lead over the Gamecube in the huge North American market.

Crucial to the success of the closed-console business model is the idea of
locking consumers into buying only approved, royalty-bearing game
titles. In other words, piracy and unapproved game titles can destroy the
profitability of the business. Hence, a console must employ security
mechanisms that hamper game copying and unapproved game development
and distribution. The failure of the Sega Dreamcast is a salient
example of what happens when security mechanisms fail.

The Dreamcast was launched in Japan on November 1998. Production
problems with the NEC PowerVR2 DC chip, the graphics accelerator used
by the Dreamcast, limited initial shipments. The following three years were a
rollercoaster ride for the Dreamcast. Popular games such as Soul Caliber,
Dead or Alive 2, Resident Evil, Crazy Taxi and Shen Mue buoyed the
Dreamcast’s popularity, while Sony’s Playstation2 launch ate away at the
Dreamcast’s sales and ultimately the confidence of software developers.
Ironically, the quality of the Dreamcast graphics was equivalent or
superior to quality to early Playstation2 titles, such as Dead or Alive 2,
despite the extra horsepower packed by the Playstation2. (The
Playstation2 is difficult to program, and it took a couple of years for
developers to realize its full potential.)

The final nail in the Dreamcast’s coffin was hammered in the spring and
summer of 2000. A German hacker group, Team Utopia, discovered a back
door inside the Dreamcast’s mask-ROM BIOS that allowed the Dreamcast
to boot from a standard CD-ROM. Nominally, the Dreamcast uses a
proprietary format called the “GD-ROM” for game distribution. The GDROM
format cannot be copied using standard CD or DVD burners.
However, the back door in the Dreamcast’s ROM BIOS enabled pirates to
eventually create monolithic CD-ROM images of video games that were
bootable without any need for hardware modification. Who was going to
pay for a game when it could be downloaded for free on the internet? The
resulting rampant piracy diminished game sales, discouraging game
developers from developing for the console and damaging Sega’s
business. Six million units sold, and about three years after its launch, the
Dreamcast was pulled from the market. Now, Sega is exclusively in the
game development business, and even makes games for their former
competitors Sony and Nintendo as well as Microsoft.

While there are many lessons to be learned from the Dreamcast experience,
this message is clear: the ability to run code from near-free sources such as
CD-Rs, DVD-Rs, or the network, without significant hardware modifications,
is the kiss of death for any console business based on the closedconsole
model. This is a brutal problem for the Microsoft Xbox, since it
is built from standard PC hardware originally designed to be open and to
run code loaded from numerous sources. Hence, Microsoft’s fate in the
console market is intimately linked to the success and robustness of the
Xbox security system. The security system has held up fairly well so far:
all of the weaknesses found require at least a solderless, warranty-voiding
modification to be installed. The need for hardware modifications limits
the practical impact of these weaknesses, since most users are afraid to
take the cover off their appliances. However, there is an intense desire
from multiple groups, legitimate and illegitimate, to get the Xbox to run
code from arbitrary sources without hardware modifications.

The Xbox is a victim of its own design: the choice to use standard PC
hardware vastly increases the value of an “opened” Xbox to hackers and
pirates alike. The Xbox is a rather satisfying target for weekend hackers and
hobbyists for the same reason Microsoft adopted the PC architecture for the
Xbox: existing PC programs are easily ported to the Xbox. In addition,
there is a wide and deep knowledge base about PC hardware, so the learning
curve for hacking the Xbox is not as steep as for other consoles. On the
other hand, the Playstation2 and the Gamecube have a steep learning curve
and they also have architectural limitations that hamper the porting of most
PC applications. The Xbox is also a popular target for pirates because of the
ease of porting legacy game emulators, and because of its high profile and
ease of obtaining compatible debugging and testing hardware.

Additionally, the similarity of the Xbox architecture to the PC architecture
makes the Xbox a good educational vehicle. The knowledge gained from
this book applies to more than than just embedded hardware or game
consoles; you should be able to apply most of the knowledge in this
book directly to PCs. Too, vast documentation resources applicable to
the Xbox, inherited from the PC world, are conveniently indexed by web
search engines. The ready availability of documentation will assist
motivated readers to build upon the knowledge contained in this book.

The Xbox is also a more appealing educational example than the run-ofthe-
mill PC. There is too much variation between the hardware details of
PC implementations to make useful step-by-step hacking guides for the
PC, whereas step-by-step guides for the Xbox are guaranteed to be
accurate across millions of units that are conveniently available for
purchase in almost any mall or electronics retailer.

About Hackers and Hacking

This is a book about hacking in the traditional sense: about the process and
methods of exploration. Some may be surprised that this book doesn’t
have chapters devoted to ripping games and patching specific security
checks — after all, isn’t that what hacking is all about? In reality, the term
“hacker” has evolved quite dramatically over the years as the public’s
awareness of technology has increased and as a sensationalist mass media
continues to color the public’s opinion of hackers.

In the beginning, a hacker was someone who worked passionately for the
sake of curiosity and exploration. There were hardware hackers who
took it upon themselves to remove the covers from computers to
optimize their design (early computers were built out of discrete
components, so they could be modified in meaningful ways with simple
tools), and there were software hackers who labored to make the most
compact and elegant code, since computational resources were scarce
and slow. There were hackers who explored the ins and outs of the phone
system, and those who explored the roofs and tunnels of buildings of
university campuses. Quite often, early hackers engaged in all of these
activities. Hackers would share their findings or results (hacks) with each
other freely, as their rewards were not financial, but came from satisfying
their intellectual curiosity and from the enthusiasm of their peers. As a
result, hackers tended to form into meritocratic groups where membership
and advancement were based entirely upon a person’s ability to hack.

As technology evolved and computers became faster and more integrated,
hackers found that the effort involved in hardware hacking was
not worth the benefits. The interesting pieces of computers were quickly
becoming buried deep within hermetically sealed ceramic packages,
etched into silicon structures that were difficult to see even with a good
microscope. A difficult hardware hack that might double the performance
of a computer was made moot within months by Moore’s Law.

On the other hand, software hacking was beginning to focus more on
applications and less on algorithms or optimization. The compactness or
elegance of a program was no longer directly important as memory and
processor power became cheap and plentiful. Besides, compiler technology
had also improved to the point where compiled code ran almost as
fast as hand assembly. By the late 80’s, the term “hacker” had grown to
imply someone who could write volumes of C code in their sleep and
create brilliant applications overnight. The old hardware hackers were
either converting to software hackers, or retreating to university labs and
corporations that could afford to support their expensive hobbies.

The term “hacker” at that time was increasingly associated with people
who cracked passwords and programs to gain access to machines and
software that was otherwise off limits. Hollywood was partly responsible
for this stereotype, with a slew of movies that portrayed teenagers
bringing the world to the brink of nuclear annihilation with a few
keystrokes, or closet geniuses creating artificially intelligent cybermonsters
in their basement.4 Unfortunately, the hyberbole of these movie
plots was lost on the general public, and this dark impression of hackers
eventually became a dominant part of the hacker stereotype. The
inaccuracy of this stereotype contributed to the creation of a term for
hackers that focuses primarily upon cracking systems and programs — 
“crackers.”

Technology shapes the contemporary hacker as much as hackers have
shaped technology. New generations of hackers have to work hard to
penetrate the “friendly” user interfaces and the media and marketing glitz
that surrounds computer technology today. Everybody uses computers
and expects them to perform flawlessly and intuitively, but few really
understand what’s going on underneath the hood.

The technology of computation has grown so complex that beginners are
increasingly like the parable about the seven blind men and the elephant.
Some beginners will start their hacking journey by exploring the Internet.
Others will start by exploring the operating system on their computer.
Still others will start by looking underneath the covers of their computer.
Each individual could spend a year exploring their facet, yet each will
have a distinctly different view about computer technology at the end the day.

The cultural rift between the young hackers and the old guard was made
apparent to me when a self-proclaimed hacker hot-shot freshman at MIT
scoffed, “Where are all the Windows[98] computers? . . . all you have are
these lame Sun computers that don’t even have AOL! I thought MIT
would have good Internet access.” He seemed to have no comprehension
of the fact that the “lame Sun computers” were quite powerful workstations
running one of the most robust operating systems in the world, and
that there is Internet beyond AOL — moreover, that the MIT campus
was one of the birthplaces of the Internet, with rights to more IP
addresses than most ISPs and a direct connection to the backbone of the Internet.

The penetration of computer technology into every corner of everyday
life intensified the hacker stereotypes. In particular, the media’s portrayal
of hackers as modern-day Robin Hoods has somehow irrevocably tied
hacking to aspects involving security or access to computer resources.
Now, the stereotypical hacker is responsible for warez, Code Red and
ping floods, while “developers” are responsible for Linux and BSD.
Hackers are 31337 d00ds that 0\/\/n jh00r b0x0r, and a hardware
hacker overclocks and mods their computer case with neon lights.
Hacking has become trendy, and many are striving to fit the stereotype
created by the media. It is very difficult today to convince people that I
hacked the Xbox solely because it was there to be hacked: it was challenging,
and it was new. Likewise, it is difficult for people to understand why I
haven’t worked on the Xbox since. After hacking the security on the
Xbox, all that is left is a standard PC — which, to me, is not that
interesting to work on, and definitely not worth the risk of a lawsuit from
Microsoft.
................................................

Screenshot

E-books Shop

Purchase Now !
Just with Paypal



Product details
 Price
 File Size
 18,189 KB
 Pages
 291 p
 File Type
 PDF format
 ISBN
 1-59327-029-1
 Copyright
 2003 by Xenatera LLC 


Table of Contents

Prologue - README.1ST ..... 1
The Video Game Console Market ......... 2
About Hackers and Hacking ............. 4
The Politics of Hacking ................. 7
The People Behind the Hacks .......... 11
Chapter 1 - Voiding the Warranty
Tools of the Trade ..................................................................................................... 15
Tools to Open Things Up .................................................................................................. 15
Tools to Attach and Remove Components .................................................................... 17
Tools to Test and Diagnose ............................................................................................... 18
Tools for Design .................................................................................................................. 20
Deconstructing the Xbox ......................................................................................... 22
Step 1: Safety First ............................................................................................................... 22
Step 2: Remove Case Screws ............................................................................................. 22
Step 3: Remove the Top Cover ........................................................................................ 24
Step 4: Move the Disk Drives ........................................................................................... 25
Step 5: Remove the Disk Drives (Optional) ................................................................... 28
Reassembling the Xbox ...................................................................................................... 28
Chapter 2 - Thinking Inside the Box
Reading a Circuit Board ............................................................................................ 32
Circuit Board Basics ............................................................................................................ 32
Components ......................................................................................................................... 34
Test Points ............................................................................................................................. 39
Xbox Architecture ..................................................................................................... 40
High-Level Organization .................................................................................................... 40
Functional Details ................................................................................................................ 42
CPU .............................................................................................................................. 42
Northbridges and Southbridges ....................................................................................... 45
RAM............................................................................................................................. 46
ROM ............................................................................................................................. 47
Odds and Ends ............................................................................................................... 48
Pattern Matching ........................................................................................................ 48
Comparison: Xbox Versus the PC ................................................................................... 49
Contrast: Xbox Versus the Gamecube ............................................................................. 50
Chapter 3 - Installing a Blue LED
What You’ll Need ....................................................................................................... 54
Removing the Xbox Front Panel ............................................................................ 54
Removing the Front Panel Circuit Board .............................................................. 58
Installing the Blue LED ............................................................................................. 59
Reassembling the Front Panel .................................................................................. 63
Debugging ................................................................................................................... 65
Chapter 4 - Building a USB Adapter
Starting Materials ........................................................................................................ 67
Strategy ........................................................................................................................ 69
Implementation ........................................................................................................... 69
Chapter 5 - Replacing a Broken Power Supply
Diagnosing a Broken Power Supply ....................................................................... 74
Replacing the Power Supply ..................................................................................... 76
Strategy .................................................................................................................................. 77
Procedure .................................................................................................................... 78
Building the Xbox Power Cable ....................................................................................... 78
Installing the Replacement Power Supply ........................................................................ 84
Operating with the Replacement Power Supply ............................................................. 85
Debugging Tips ................................................................................................................... 86
Chapter 6 - The Best Xbox Game: Security Hacking 
First Encounters with a Paranoid Design .............................................................. 90
To Snarf a ROM ................................................................................................................. 90
An Encounter with Microsoft ........................................................................................... 92
Analyzing the ROM Contents ............................................................................................ 93
Chapter 7 - A Brief Primer on Security
Who Needs Security, Anyways? ............................................................................. 101
A Brief Primer on Cryptography .......................................................................... 104
Classes of Cryptographic Algorithms ............................................................................ 105
SHA-1 Hash ............................................................................................................. 109
TEA ........................................................................................................................... 111
RC-4 ............................................................................................................................ 113
RSA ............................................................................................................................ 114
The Rest of the Picture ..................................................................................................... 116
Chapter 8 - Reverse Engineering Xbox Security
Extracting Secrets from Hardware ....................................................................... 119
Eavesdropping a High Speed Bus .................................................................................. 122
Tapping the Bus on a Budget ......................................................................................... 122
Building the Data Logger ............................................................................................. 129
Determining the Bus Order and Polarity ....................................................................... 131
Making Sense of the Captured Data ..................................................................... 131
Chapter 9 - Sneaking in the Back Door
Back Doors and Security Holes ............................................................................. 138
Visor Jam Table Attacks ................................................................................................... 139
MIST Premature Unmap Attack ..................................................................................... 140
Microsoft Retaliates ................................................................................................. 141
Reverse Engineering v1.1 Security ........................................................................ 142
The Threat of Back Doors ..................................................................................... 147
Chapter 10 - More Hardware Projects
The LPC Interface .................................................................................................... 151
LPC Interface on the Xbox ............................................................................................. 152
Using the LPC Interface ................................................................................................... 153
The Other 64 MB of SDRAM ............................................................................... 155
Xbox VGA................................................................................................................ 157
Mass Storage Replacement ..................................................................................... 158
Chapter 11 - Developing Software for the Xbox
Xbox-Linux ............................................................................................................... 161
Installing Xbox-Linux ....................................................................................................... 162
“Project B” ......................................................................................................................... 166
OpenXDK................................................................................................................. 171
Chapter 12 - Caveat Hacker
Caveat Hacker: A Primer on Intellectual Property, by Lee Tien ..................... 175
Classical Intellectual Property Law: An Overview ....................................................... 175
Copyright ...................................................................................................................... 176
Patent ........................................................................................................................... 178
Trade Secrets ................................................................................................................ 179
The Constitutional Copyright Bargain ........................................................................... 179
The Traditional View of Reverse Engineering .............................................................. 180
Trade Secrecy and “Improper Means” ........................................................................... 180
Copyright Law and the Problem of Intermediate Copying .............................................. 181
Patent Law .................................................................................................................. 182
New Challenges for Reverse Engineers ......................................................................... 183
The Digital Millennium Copyright Act and the Problem of Unauthorized Access .......... 184
Unauthorized Access ..................................................................................................... 184
Circumvention Technologies............................................................................................. 185
Navigating the DMCA’s Exemptions ........................................................................... 185
1201(f): reverse-engineering for interoperability ........................................ 186
1201(g): encryption research ......................................................................... 187
1201(j): security research ................................................................................ 187
End-User License Agreements and Contractual Prohibitions on Reverse-Engineering ...... 187
Trade Secrets and the Economic Espionage Act ............................................................. 189
The Responsible Hacker: Ignorance Is No Defense .................................................... 189
Civil and Criminal Offenses and Penalties ...................................................................... 190
Reverse Engineering as “The Freedom to Tinker” and Other Legal Issues ............. 191
Chapter 13 - Onward!
The Hacking Community ........................................................................................ 193
Hacking Fora ...................................................................................................................... 194
Making a Contribution ..................................................................................................... 195
Trusted Computing .................................................................................................. 197
Taking a Step Back ............................................................................................................ 199
Palladium Versus TCPA.................................................................................................... 202
Hacking the Trusted PC .................................................................................................... 204
Looking Forward .............................................................................................................. 205
Concluding Thoughts .............................................................................................. 206
Appendix A - Where to Get Your Hacking Gear
Vendors for Hobbyists ............................................................................................ 207
Prepared Equipment Order Forms ...................................................................... 209
Appendix B - Soldering Techniques
Introduction to Soldering ....................................................................................... 211
Use Flux .............................................................................................................................. 212
Starter Tips ......................................................................................................................... 213
Surface Mount Soldering ......................................................................................... 214
Technique for Simple Components ................................................................................ 215
Technique for Complex Components ........................................................................... 216
Technique for Removing Components .......................................................................... 219
Appendix C - Getting into PCB Layout
Philosophy and Design Flow ................................................................................. 223
Refining Your Idea ............................................................................................................ 223
Schematic Capture ............................................................................................................. 224
Board Layout ..................................................................................................................... 226
General Placement and Routing Guidelines .................................................................. 227
Leave Space for Via Fanouts on Surface Mount Devices ............................................... 228
Decoupling Capacitors Fit Nicely Under SMD Pads .................................................... 228
Know Your Special Traces ............................................................................................. 229
Circuit Boards Make Fine Heatsinks ........................................................................... 231
Establish Preferred Routing Directions for Each Layer ................................................. 231
Stack a Board with Orthogonal Layers ........................................................................ 231
On Two-Layer Boards, Use Fingers to Bus Power ........................................................ 232
Hints on Using an Auto-Router ................................................................................... 232
CAD Tools ................................................................................................................ 232
Board Fabrication Companies ............................................................................... 233
Sierra Proto Express ......................................................................................................... 233
Data Circuit Systems ......................................................................................................... 234
Advanced Circuits ............................................................................................................. 234
Alberta Printed Circuits ..................................................................................................... 234
Starter Projects ......................................................................................................... 235
Appendix D - Getting Started with FPGAs
What Is an FPGA? ................................................................................................... 237
Designing for an FPGA .......................................................................................... 239
Project Ideas ....................................................................................................................... 243
Where to Buy ..................................................................................................................... 244
Appendix E - Debugging: Hints and Tips
Don’t Panic! ............................................................................................................... 247
Understand the System ..................................................................................................... 247
Observe Symptoms .......................................................................................................... 248
Common Bugs .......................................................................................................... 249
Recovering from a Lifted Trace or Pad ............................................................... 252
Appendix F - Xbox Hardware Reference
Power Supply Pinout ............................................................................................... 257
Video Connector Pinout ......................................................................................... 258
USB Connector Pinout ............................................................................................ 260
Ethernet Connector Pinout .................................................................................... 261
ATA Connector Pinout ........................................................................................... 262
DVD-ROM Power Connector .............................................................................. 263
LPC Connector ........................................................................................................ 264
Fan Connector .......................................................................................................... 265
Front Panel Connector ............................................................................................ 265
Index.............................................................................267

  ●▬▬▬▬▬❂❂❂▬▬▬▬▬●
●▬▬❂❂▬▬●
●▬❂▬●

═════ ═════

Previous Post Next Post