Fix It Felix Jr. OS INFO

The 1up

New member
Joined
Feb 17, 2011
Messages
31
Reaction score
1
Location
Denver, Colorado
Here is the scoop on the FIFjr:

Now that Billy has chosen to sell this grail on Ebay, we may as well let you know what is inside it. With a move like this, wherever these machines are now is probably where they will remain or Disney will try to recover them.

We were lucky enough to have the machine twice:

The first time we had it we dismantled the entire thing only to find out that the bios of each PC used to run the game is encrypted.

The encrypted bios then boots an encrypted version of windows on SCSI hard drive #1

Once this boot is successful, the second SCSI drive then boots, and it is this drive that runs the game software.

A Jpac is the controlling interface.

We tried everything to ghost/copy the drives and they cannot be seen by any other computer.

Once you put all of the original hardware back together the machine boots right up.

When we received the game for the Kong Off, upon arrival, the computer was flipped over and had been damaged during transit. We never got a a chance to have it up and running at the Kong Off or attempt the ghosting process again.

In the end, especially when you are dealing with Disney, it was a blessing in disguise to not be the ones responsible for figuring out how to emulate this thing.

I guess the three sets of artwork and the custom cpo's to match the final game with the extra jump button will remain in their tubes.

Hope to se you all at The Kong Off 3 next November

J-O
 
I hope whoever buys it is inclined to get it deconstructed, otherwise it will only live until the hard drive fails.
 
Two hard drives, one failure will take out the game, or possibly the motherboard battery fails or just the motherboard fails in general, or it hits a self destruct date that no one knows about.

Glad I am not going to be the one sitting on that time bomb.

With all the encryption it is more likely that the code will get leaked than it is the encryption will get broken.
I hope whoever buys it is inclined to get it deconstructed, otherwise it will only live until the hard drive fails.
 
Here is the scoop on the FIFjr:

Now that Billy has chosen to sell this grail on Ebay, we may as well let you know what is inside it. With a move like this, wherever these machines are now is probably where they will remain or Disney will try to recover them.

We were lucky enough to have the machine twice:

The first time we had it we dismantled the entire thing only to find out that the bios of each PC used to run the game is encrypted.

The encrypted bios then boots an encrypted version of windows on SCSI hard drive #1

Once this boot is successful, the second SCSI drive then boots, and it is this drive that runs the game software.

A Jpac is the controlling interface.

We tried everything to ghost/copy the drives and they cannot be seen by any other computer.

Once you put all of the original hardware back together the machine boots right up.

When we received the game for the Kong Off, upon arrival, the computer was flipped over and had been damaged during transit. We never got a a chance to have it up and running at the Kong Off or attempt the ghosting process again.

In the end, especially when you are dealing with Disney, it was a blessing in disguise to not be the ones responsible for figuring out how to emulate this thing.

I guess the three sets of artwork and the custom cpo's to match the final game with the extra jump button will remain in their tubes.

Hope to se you all at The Kong Off 3 next November

J-O

Geez... seriously? They let you borrow the game, and you practically dismantle the whole thing and try your best to pirate it... and even admit to all of it publicly on the internet? What would you have done had you broken something in the process, or if they put in a "suicide" device? I think I'd be grateful just to get the chance to borrow it, and taking a peek inside would fulfill my curiosity.

Now if I dropped $20K and actually purchased the machine, I'd do all I could to back it up, but in that case, it'd be mine to do what I want.

DogP
 
Encrypted bios? There's a video on youtube showing the cabinet booting off a retail HP system straight into Windows XP. What exactly do you mean by "encrypted"?

You are telling me that.. A SCSI drive (...in a consumer grade HP desktop.. in 2012..) boots the so called encrypted windows xp, then then 'another drive boots' .. Well what do you mean EXACTLY by that? The OS reboots (???) onto the second drive, which somehow contains another encrypted copy of the OS, but with the game software this time? Ok

If you mean by "the second scsi drive boots"; you mean that the second drive is mounted and activated by the OS, how were you able to determine that? You managed to somehow get OS level access and saw the drive being auto-mounted?

What software was used for the cloning attempt? Ghost is rather primitive..
 
Last edited:
mckayla-maroney-meme-getty.jpg
 
If I got my hands on it, it would have been cloned.. just saying and I have references to back it up incase the new owner sees this post....
 
Count me in the dubious camp as well. These were quickly put together as a promotional item using off the shelf equipment. There is no reason to put that kind of protection on an item like this...
 
Call me a noob, but wouldn't the PC motherboard need a corresponding key to read and load the data? Perhaps that's a better starting point.
 
heh.

Its probably just some small flash application in the windows startup folder with zero security.
 
heh.

Its probably just some small flash application in the windows startup folder with zero security.

I'd place my bet with something similar. From the video it obviously loaded Windows, and then went into the shell loading the game. Still don't see why they didn't even inject a different loading screen instead of windows just for the hell of it. Not like it's a lot of work to do.
 
This makes sense, and it's not too hard to implement.

2 hard drives, one as the boot drive, and one as the OS drive. Both with HD encryption, tied to the mobo hardware. Again, not too hard to implement.

I doubt the OS is encrypted, but folks are right, if the HDD has encryption, you're not gonna get to see anything unless you can break into the OS while the machine is on.

Of course, what about a good ol' fashioned control-alt-delete? If the machine truly is running XP, you should be able to hit it with a keyboard and at least bring up the task manager.

This is just a matter of time.
 
This makes sense, and it's not too hard to implement.

2 hard drives, one as the boot drive, and one as the OS drive. Both with HD encryption, tied to the mobo hardware. Again, not too hard to implement.

I doubt the OS is encrypted, but folks are right, if the HDD has encryption, you're not gonna get to see anything unless you can break into the OS while the machine is on.

Of course, what about a good ol' fashioned control-alt-delete? If the machine truly is running XP, you should be able to hit it with a keyboard and at least bring up the task manager.

This is just a matter of time.

Not if disabled with a policy.
 
depending on the encryption this could be easy or hard. If it's standard XP NTFS linux can get past that in a new york second....
 
Back
Top Bottom