http://www.maxconsole.com/maxcon_for...=xboxonecrunch
The big change appears to be 2 bytes in the mbr, thats it. Well, as much as i could pull from the program, and the code looked all there, the drive is parsed at least so this isn't some madman flailing a hexwand around.
Congratulations are in order I guess.
I'm wondering if a safer passthrough method could not be employed in a manner not unlike mounting a drive image, may be worth researching that, saves manipulating the mbr.
Some of the comments on that link are just stupid, in terms of a library or a windows service that would be fantastic, subtle even.
It's just plain weird it's that simple, it can't be.. can it? I was expecting some bastardised encryption formed in the mind of a mental patient guarded by ninjas, dogs with rabies and ninjas with rabies because the dogs are rabid and who the hell wants to be around that?.
It might just be using a form of NTFS thats simply had a name change? Security wise that's just stupid but functionally, genius. Nothing of true value would be stored on the external anyway so why bother securing it to that extent, yay for us.