Stylistic Q702 Disassembly

Discussion in 'Fujitsu' started by NXTwoThou, Dec 12, 2012.

  1. thepinkpanter

    thepinkpanter Pen Pal - Newbie

    Messages:
    36
    Likes Received:
    3
    Trophy Points:
    16
    maybe by updating the bios?:confused:
     
  2. thepinkpanter

    thepinkpanter Pen Pal - Newbie

    Messages:
    36
    Likes Received:
    3
    Trophy Points:
    16
    The TPM IFX 3.17 vers. 1.2 has a factory default blocked list and I am not able to unblock them in order to be ownership, also in the bios TPM is locked and no way to disable it. if someone can do it .....the "non wwan upgradable" will become upgradable 4G/LTE.

    step 1)go to command prompt,
    step 2)type tpm.msc ,
    step 3) click enter,

    than I got the "trusted platform module (TPM) management on local computer"

    click on command management and you will see what you are able or unable to do ........some item is blocked and some not......


    see the below sample:

    Status Command Number Category Command Name Description
    Blocked 151 Admin Startup and State TPM_Init This is the first command sent by the computer. During the boot process, this command is sent to the TPM. This command cannot be run by software.
    Blocked 152 Admin Startup and State TPM_SaveState This command warns the TPM to save state before entering the sleep state.
    Blocked 153 Admin Startup and State TPM_Startup This command must follow the TPM_Init command. It transmits additional computer information to the TPM about the type of reset that is occurring at the time of the call.
    Allowed 80 Admin Testing TPM_SelfTestFull This command tests all of the TPM's internal functions. Any failure causes the TPM to enter into failure mode.
    Blocked 83 Admin Testing TPM_ContinueSelfTest This command informs the TPM that it may complete the self test of all TPM functions that were not tested during the power-on self test.
    Allowed 84 Admin Testing TPM_GetTestResult This command provides manufacturer-specific and diagnostic information regarding the results of the self test.
    Allowed 110 Admin Opt-in TPM_OwnerSetDisable This command allows the TPM owner to enable or disable the TPM. See the descriptions for the TPM_PhysicalEnable and TPM_PhysicalDisable commands for more information.
    Blocked 111 Admin Opt-in TPM_PhysicalEnable This command enables the TPM. This command requires physical presence at the computer and cannot be run by the operating system. Turning on the TPM involves enabling and activating the TPM (with TPM_PhysicalSetDeactivated).
    Blocked 112 Admin Opt-in TPM_PhysicalDisable This command disables the TPM. This command requires physical presence at the computer and cannot be run by the operating system. Turning off the TPM involves disabling or deactivating the TPM (with TPM_PhysicalSetDeactivated).
    Blocked 113 Admin Opt-in TPM_SetOwnerInstall This command allows or disallows the ability to set an owner. This command requires physical presence at the computer and cannot be run by the operating system.
    Blocked 114 Admin Opt-in TPM_PhysicalSetDeactivated This command activates or deactivates the TPM. This command requires physical presence at the computer and cannot be run by the operating system. We do not recommend that this command be blocked.
    Allowed 115 Admin Opt-in TPM_SetTempDeactivated This command allows the operator of the computer to deactivate the TPM until the next computer restart. The operator must either have physical presence at the computer or present the operator authorization value defined with the TPM_SetOperatorAuth command.
    Blocked 116 Admin Opt-in TPM_SetOperatorAuth This command defines the operator authorization value. This command requires physical presence at the computer and cannot be run by the operating system.
    Allowed 1073741834 Admin Ownership TSC_PhysicalPresence This command asserts physical presence at the computer. This command cannot be run by the operating system.
    Blocked 1073741835 Admin Ownership TSC_ResetEstablishmentBit This command is not used in the current version of BitLocker.
    Blocked 13 Admin Ownership TPM_TakeOwnership This command takes ownership of the TPM with a new owner authorization value, derived from the owner password. Among other conditions that must be met before this command can run, the TPM must be enabled and activated.
    Allowed 91 Admin Ownership TPM_OwnerClear This command allows the TPM owner to clear the TPM. This means that the only key remaining on the TPM is the endorsement key.
    Allowed 92 Admin Ownership TPM_DisableOwnerClear This command allows the TPM owner to permanently disable the TPM_OwnerClear command. Once used, the owner must run the TPM_ForceClear command to clear the TPM.
    Blocked 93 Admin Ownership TPM_ForceClear This command clears the TPM. This command requires physical presence at the computer and cannot be run by the operating system.
    Allowed 94 Admin Ownership TPM_DisableForceClear This command disables the TPM_ForceClear command until the computer restarts.
    Allowed 63 GetCapability Commands TPM_SetCapability This command allows the TPM owner to set values in the TPM.
    Allowed 101 GetCapability Commands TPM_GetCapability This command returns TPM information.
    Allowed 133 Auditing TPM_GetAuditDigest This command returns the TPM audit digest.
    Allowed 134 Auditing TPM_GetAuditDigestSigned This command returns a signed TPM audit digest and list of currently audited commands.
    Allowed 141 Auditing TPM_SetOrdinalAuditStatus This command allows the TPM owner to set the audit flag for a given command number. When this flag is turned on, the command returns an audit to the audit digest and the command is added to the list of currently audited commands.
    Allowed 64 Administrative Functions - Management TPM_ResetLockValue This command resets the mechanisms used to protect against attacks on TPM authorization values.
    Allowed 154 Administrative Functions - Management TPM_SetRedirection This command allows the TPM to directly communicate with a connected security processor by redirecting output.
    Allowed 170 Administrative Functions - Management TPM_FieldUpgrade This command allows a manufacturer upgrade of TPM functionality. This command is specific to the TPM manufacturer.
    Allowed 23 Storage Functions TPM_Seal This command allows the TPM to seal secrets until integrity, computer configuration, and authorization checks succeed.
    Allowed 24 Storage Functions TPM_Unseal This command releases secrets previously sealed by the TPM if integrity, platform configuration, and authorization checks succeed.
    Allowed 30 Storage Functions TPM_Unbind This command decrypts data previously encrypted with the public portion of a TPM-bound key.
    Allowed 31 Storage Functions TPM_CreateWrapKey This command generates and creates a secure asymmetric key.
    Allowed 33 Storage Functions TPM_GetPubKey This command allows an owner of a loaded key to obtain the public key value of that key. The loaded key is created using the TPM_LoadKey2 command.
    Allowed 61 Storage Functions TPM_Sealx This command allows software to protect secrets so that they are released only if a specified computer configuration is validated. The secret must be encrypted.
    Allowed 65 Storage Functions TPM_LoadKey2 This command loads a key into TPM so that the owner can set other actions on it. These actions include wrap, unwrap, bind, unbind, seal, unseal, and sign.
    Allowed 18 Migration TPM_CMK_CreateTicket This command allows the TPM owner to create a signature verification ticket using a provided public key. This ticket is used with a certifiable migration key (as generated by TPM_CMK_CreateKey) to create a migration blob needed to move the key to a new computer or parent key.
    Allowed 19 Migration TPM_CMK_CreateKey This command generates a secure asymmetric certifiable migration key using the authorization ticket for one or more migration authorities (as generated by TPM_CMK_ApproveMA).
    Allowed 27 Migration TPM_CMK_CreateBlob This command allows an entity with knowledge of the migration authorization ticket (as generated by TPM_CMK_CreateTicket) of a certifiable migration key (as generated by TPM_CMK_CreateKey) to create a migration blob necessary to move the key to a new computer or parent key.
    Allowed 28 Migration TPM_CMK_SetRestrictions This command allows the TPM owner to specify usage of a certifiable-migration key (as generated by TPM_CMK_CreateKey).
    Allowed 29 Migration TPM_CMK_ApproveMA This command allows the TPM owner to create an authorization ticket for one or more migration authorities so that users can create certifiable migration keys (with TPM_CMK_CreateKey) without involvement of the TPM owner.
    Allowed 36 Migration TPM_CMK_ConvertMigration This command creates a certifiable migration key blob that can be loaded onto another computer using the TPM_LoadKey2 command. This command is given a random number and the certifiable migration key's migration blob (as generated by TPM_CMK_CreateBlob).
    Allowed 37 Migration TPM_MigrateKey This command allows the TPM to migrate a blob (as generated by TPM_CreateMigrationBlob or TPM_CMK_CreateBlob) to a destination by re-encrypting it with a given public key.
    Allowed 40 Migration TPM_CreateMigrationBlob This command allows an entity with knowledge of the migration authorization ticket of a key (as created with TPM_CMK_CreateTicket) to create a migration blob necessary to move a migration key to a new computer or parent key.
    Allowed 42 Migration TPM_ConvertMigrationBlob This command creates a key blob that can be loaded onto another computer using the TPM_LoadKey2 command. This command is given a random number and the key's migration blob (as generated by TPM_CreateMigrationBlob).
    Allowed 43 Migration TPM_AuthorizeMigrationKey This command allows the TPM owner to create a migration authorization ticket so that users can move keys without involvement of the TPM owner.
    Allowed 44 Maintenance Functions (Optional) TPM_CreateMaintenanceArchive This command allows the TPM owner to create a maintenance archive that enables the migration of data held by the TPM. This data includes the storage root key (SRK) and the TPM owner authorization.
    Allowed 45 Maintenance Functions (Optional) TPM_LoadMaintenanceArchive This command allows the TPM owner to load a maintenance archive (generated by TPM_CreateMaintenanceArchive). When loaded, the authorization value for the storage root key (SRK) is set to be same as the TPM owner authorization.
    Allowed 46 Maintenance Functions (Optional) TPM_KillMaintenanceFeature This command allows the TPM owner to prevent the creation of a maintenance archive using the TPM_CreateMaintenanceArchive command. This action is valid until a new TPM owner is set using the TPM_TakeOwnership command.
    Blocked 47 Maintenance Functions (Optional) TPM_LoadManuMaintPub This command loads the computer manufacturer's public key into the TPM for use during maintenance. This command can only be run once and should be run before a computer ships.
    Blocked 48 Maintenance Functions (Optional) TPM_ReadManuMaintPub This command returns the digest of the computer manufacturer's public maintenance key (loaded by TPM_LoadManuMaintPub).
    Allowed 50 Cryptographic Functions TPM_CertifyKey This command certifies a loaded key (created by TPM_LoadKey2) with the public portion of another key. A TPM identity key may only certify non-migratable keys. Signing and legacy keys may certify all keys.
    Allowed 51 Cryptographic Functions TPM_CertifyKey2 This command is based on TPM_CertifyKey, but includes extra parameters to certify a Certifiable Migration Key (CMK).
    Allowed 60 Cryptographic Functions TPM_Sign This command signs data with a loaded signing key and returns the resulting digital signature.
    Allowed 70 Cryptographic Functions TPM_GetRandom This command returns random data of a specified length from the TPM random number generator.
    Allowed 71 Cryptographic Functions TPM_StirRandom This command adds entropy to the TPM random number generator state.
    Blocked 160 Cryptographic Functions TPM_SHA1Start This command starts the process of calculating a SHA-1 digest. This command must be followed by execution of TPM_SHA1Update or the SHA-1 process is invalidated.
    Blocked 161 Cryptographic Functions TPM_SHA1Update This command inputs complete blocks of data into a pending SHA-1 digest (started by TPM_SHA1Start).
    Blocked 162 Cryptographic Functions TPM_SHA1Complete This command completes a pending SHA-1 digest process and returns the resulting SHA-1 hash output.
    Blocked 163 Cryptographic Functions TPM_SHA1CompleteExtend This command completes a pending SHA-1 digest process, returns the resulting SHA-1 hash output, and incorporates this hash into a platform configuration register (PCR).
    Allowed 120 Endorsement Key Handling TPM_CreateEndorsementKeyPair This command creates the TPM endorsement key (EK), if this key does not already exist.
    Allowed 124 Endorsement Key Handling TPM_ReadPubek This command returns the public portion of the TPM endorsement key. This command is disabled when ownership of the TPM is taken using the TPM_TakeOwnership command.
    Allowed 127 Endorsement Key Handling TPM_CreateRevocableEK This command creates the TPM endorsement key (EK). The user can also specify whether the EK can be reset, and can specify the authorization value necessary to reset this key (if this value is not to be generated by the TPM). This is an optional command that may not be supported by the computer manufacturer.
    Allowed 128 Endorsement Key Handling TPM_RevokeTrust This command clears a revocable TPM endorsement key (generated by TPM_CreateRevocableEK) and resets the TPM, if it finds the correct authorization value for this reset. This command requires physical presence at the platform and cannot be run by the operating system.
    Allowed 129 Endorsement Key Handling TPM_OwnerReadInternalPub This command allows the TPM owner to return the public portion of the TPM endorsement key (EK) or storage root key (SRK).
    Allowed 121 Identity Creation and Activation TPM_MakeIdentity This command allows the TPM owner to generate an Attestation Identity Key (AIK) that can be used to sign information generated internally by the TPM.
    Allowed 122 Identity Creation and Activation TPM_ActivateIdentity This command allows the TPM owner to unwrap the session key that allows for the decryption of the Attestation Identity Key (AIK) credential, thereby obtaining assurance that the credential is valid for the TPM.
    Blocked 20 Integrity Collection and Reporting TPM_Extend This command adds a new digest to a specified platform configuration register (PCR) and returns this extended digest.
    Allowed 21 Integrity Collection and Reporting TPM_PCRRead This command returns the contents of a specified platform configuration register (PCR).
    Allowed 22 Integrity Collection and Reporting TPM_Quote This command returns a signed digest that is a combination of the contents of a specified platform configuration register (PCR) and some specified external data. The digest is signed with a loaded key.
    Allowed 62 Integrity Collection and Reporting TPM_Quote2 This command is similar to the TPM_Quote command, but includes locality information to provide a more complete view of the current computer configuration.
    Blocked 200 Integrity Collection and Reporting TPM_PCR_Reset This command resets the specified platform configuration registers (PCR's) to its default state.
    Allowed 12 Changing AuthData TPM_ChangeAuth This command allows the owner of an entity (such as a TPM key) to change the authorization value for that entity.
    Blocked 16 Changing AuthData TPM_ChangeAuthOwner This command allows the TPM owner to change the TPM owner authorization value or the storage root key (SRK) authorization value.
    Allowed 10 Authorization Sessions TPM_OIAP This command generates an authorization session handle for the Object-Independent Authorization Protocol (OIAP) used to securely pass authorization data to the TPM, as well as the information the TPM needs to track this authorization session handle.
    Allowed 11 Authorization Sessions TPM_OSAP This command generates an authorization session handle for the Object-Specific Authorization Protocol (OSAP) used to securely pass authorization data to the TPM, as well as the information the TPM needs to track this authorization session handle.
    Allowed 17 Authorization Sessions TPM_DSAP This command generates an authorization session handle for the Delegate-Specific Authorization Protocol (DSAP) used to securely pass delegated authorization data to the TPM and the information the TPM needs to track this authorization session handle.
    Blocked 117 Authorization Sessions TPM_SetOwnerPointer This command sets the reference to the owner authorization that the TPM uses when executing an OIAP or OSAP session. Use this command only when you need to provide owner delegation functionality for legacy code that does not support DSAP.
    Allowed 209 Delegation Commands TPM_Delegate_UpdateVerification This command allows the TPM owner to update a delegation entity so that it will continue to be accepted by the TPM.
    Allowed 210 Delegation Commands TPM_Delegate_Manage This command allows the TPM owner to manage delegation family tables. Run this command at least once before running delegation commands for a family table.
    Allowed 212 Delegation Commands TPM_Delegate_CreateKeyDelegation This command allows the owner of a key to delegate the privilege to use that key.
    Allowed 213 Delegation Commands TPM_Delegate_CreateOwnerDelegation This command allows the TPM owner to delegate the privilege to run commands that typically require owner authorization.
    Allowed 214 Delegation Commands TPM_Delegate_VerifyDelegation This command interprets a delegate blob and returns whether that blob is currently valid.
    Allowed 216 Delegation Commands TPM_Delegate_LoadOwnerDelegation This command allows the TPM owner to load a row of a delegation tables into the TPM's non-volatile storage. This command cannot be used to load key delegation blobs into the TPM.
    Allowed 219 Delegation Commands TPM_Delegate_ReadTable This command reads the public contents of the family and delegate tables that are stored on the TPM.
    Allowed 204 Non-volatile Storage TPM_NV_DefineSpace This command allows the TPM owner to define space for an area of non-volatile storage on the TPM. This definition includes the access requirements for writing and reading the area.
    Allowed 205 Non-volatile Storage TPM_NV_WriteValue This command writes a specified value to a defined non-volatile storage area (created by TPM_NV_DefineSpace).
    Allowed 206 Non-volatile Storage TPM_NV_WriteValueAuth This command writes a specified value to a defined non-volatile storage area, if it finds the required authorization for that area.
    Allowed 207 Non-volatile Storage TPM_NV_ReadValue This command reads from a defined non-volatile storage area.
    Allowed 208 Non-volatile Storage TPM_NV_ReadValueAuth This command reads from a defined non-volatile storage area, if it finds the required authorization for that area.
    Blocked 35 Session Management TPM_KeyControlOwner This command allows the TPM owner to set certain attributes such as whether the key can be evicted by anyone but the owner.
    Blocked 184 Session Management TPM_SaveContext This command saves a loaded resource outside the TPM. After successful execution of this command the TPM automatically releases the internal memory for sessions but leaves keys in place.
    Blocked 185 Session Management TPM_LoadContext This command loads a previously saved context into the TPM.
    Allowed 186 Eviction TPM_FlushSpecific This command flushes a specified resources handle from the TPM.
    Allowed 241 Timing Ticks TPM_GetTicks This command returns the current tick count of the TPM.
    Allowed 242 Timing Ticks TPM_TickStampBlob This command signs a specified digest with the TPM's current tick count using a loaded signature key.
    Allowed 230 Transport Sessions TPM_EstablishTransport This command establishes a transport session that can be used to confidentially transmit shared secrets, encryption keys, and session logs to the TPM (using TPM_ExecuteTransport).
    Allowed 231 Transport Sessions TPM_ExecuteTransport This command delivers a wrapped TPM command to the TPM within a transport session. The TPM unwraps the command and then runs the command.
    Allowed 232 Transport Sessions TPM_ReleaseTransportSigned This command completes the transport session. If logging is turned on, this command returns a hash of all operations performed during session, as well as the digital signature of the hash.
    Blocked 220 Monotonic Counter TPM_CreateCounter This command allows the TPM owner to create a new monotonic counter, assign an authorization value to that counter, increment the TPM's internal counter value by one, and set the new counter's start value to be the updated internal value.
    Blocked 221 Monotonic Counter TPM_IncrementCounter This command allows the owner of the monotonic counter to increment that counter by one and return this updated value.
    Blocked 222 Monotonic Counter TPM_ReadCounter This command returns the value of the specified monotonic counter.
    Blocked 223 Monotonic Counter TPM_ReleaseCounter This command allows the owner of the counter to release the specified counter. This command stops all subsequent reads or increments of the counter.
    Blocked 224 Monotonic Counter TPM_ReleaseCounterOwner This command allows the TPM owner to release the specified counter. This stops all subsequent reads or increments of the counter.
    Allowed 41 DAA Commands TPM_DAA_Join This command allows the TPM owner to establish the Direct Anonymous Attestation (DAA) parameters in the TPM for a specific DAA issuing authority.
    Allowed 49 DAA Commands TPM_DAA_Sign This command allows the TPM owner to sign data using Direct Anonymous Attestation (DAA).
    Blocked 14 Deprecated Commands TPM_ChangeAuthAsymStart This command is superseded by establishing a transport session with the TPM and running the TPM_ChangeAuth command.
    Blocked 15 Deprecated Commands TPM_ChangeAuthAsymFinish This command is superseded by establishing a transport session with the TPM and running the TPM_ChangeAuth command.
    Blocked 25 Deprecated Commands TPM_DirWriteAuth This command is superseded by the TPM_NV_WriteValue and TPM_NV_WriteValueAuth commands.
    Blocked 26 Deprecated Commands TPM_DirRead This command is superseded by the TPM_NV_ReadValue and TPM_NV_ReadValueAuth commands.
    Blocked 32 Deprecated Commands TPM_LoadKey This command is superseded by the TPM_LoadKey2 command.
    Blocked 34 Deprecated Commands TPM_EvictKey This command is superseded by the TPM_FlushSpecific command.
    Blocked 82 Deprecated Commands TPM_CertifySelfTest This command performs a full self-test and returns an authenticated value if the test passes. This command is not upgraded for version 1.2 of the TPM.
    Blocked 90 Deprecated Commands TPM_Reset This command releases all resources associated with existing authorization sessions. This command is not upgraded for version 1.2 of the TPM.
    Allowed 125 Deprecated Commands TPM_OwnerReadPubek This command is superseded by the TPM_OwnerReadInternalPub command.
    Blocked 126 Deprecated Commands TPM_DisablePubekRead This command is superseded by having the TPM_TakeOwnership command automatically disable reading the public portion of the endorsement key (EK) using the TPM_ReadPubek command.
    Blocked 150 Deprecated Commands TPM_Terminate_Handle This command is superseded by the TPM_FlushSpecific command.
    Blocked 180 Deprecated Commands TPM_SaveKeyContext This command is superseded by the TPM_SaveContext command.
    Blocked 181 Deprecated Commands TPM_LoadKeyContext This command is superseded by the TPM_LoadContext command.
    Blocked 183 Deprecated Commands TPM_LoadAuthContext This command is superseded by the TPM_LoadContext command.
    Blocked 182 Deprecated Commands TPM_SaveAuthContext This command is superseded by the TPM_SaveContext command.
    Blocked 100 Deleted Commands TPM_GetCapabilitySigned This command has been removed because of security concerns.
    Allowed 102 Deleted Commands TPM_GetCapabilityOwner This command has been removed because of security concerns.
    Blocked 130 Deleted Commands TPM_GetAuditEvent This command has been removed because of security concerns.
    Blocked 131 Deleted Commands TPM_GetAuditEventSigned This command has been removed because of security concerns.
    Blocked 140 Deleted Commands TPM_GetOrdinalAuditStatus This command has been removed because of security concerns.


    ___________

    many of the command number are factory default blocked :-(


    so if someone know how to bypass or unblock those blocked commands number as the number 13 :
    Blocked 13 Admin Ownership TPM_TakeOwnership This command takes ownership of the TPM with a new owner authorization value, derived from the owner password. Among other conditions that must be met before this command can run, the TPM must be enabled and activated.

    this NON WWAN will be WWAN enabled!

    please Help
     
  3. Zsan

    Zsan Pen Pal - Newbie

    Messages:
    4
    Likes Received:
    0
    Trophy Points:
    5
    first of all go to your system BIOS (F2) and set up an admin paswword. then you will be able to make cnnages on TPM.
    I do not think that WWAN has anything to do with TPM.
    TPM is for drive encryption as far as I know.
     
  4. Zsan

    Zsan Pen Pal - Newbie

    Messages:
    4
    Likes Received:
    0
    Trophy Points:
    5
    I confirm, setting a master BIOS password will make available the disable TPM, actually TPM management available.
     
  5. thepinkpanter

    thepinkpanter Pen Pal - Newbie

    Messages:
    36
    Likes Received:
    3
    Trophy Points:
    16
    I did try to change it from bios , I can enable/disable almost everything but TPM is locked .......
    I think you'r right about the TPM.......
    I tryed an old Fujitsu Goobi2000 and it is visible in the device manager but I can't us the aircard watcher or onclick internet because it showing incompatible application so now I just bought the Fujitsu Gobi3000 and I am sure it will work fine with the windows 8 application from fujitu support,

    after this many test I realized that maybe I can install only genuine minicard sold by Fujitsu and not cheaper minicard sold on ebay or other places ....even if the minicard is the same model it will not be configurated in the device manager.
     
  6. Zsan

    Zsan Pen Pal - Newbie

    Messages:
    4
    Likes Received:
    0
    Trophy Points:
    5
     
  7. thepinkpanter

    thepinkpanter Pen Pal - Newbie

    Messages:
    36
    Likes Received:
    3
    Trophy Points:
    16
    For what do I need that driver?

    Here is the ribbon that I used to connect the sim board,
    Ebay otem # 171039109331

    Thank again
     
  8. Zsan

    Zsan Pen Pal - Newbie

    Messages:
    4
    Likes Received:
    0
    Trophy Points:
    5
    You need several items.
    1. Ribbon
    2. SIM slot module
    3. WWAN card + internal antenna cables - here you will need the drivers.

    open your tab and compare with pictures from my tab, the link from my previous post ( google drive ). See the differences then get those 4 items.
    as mentioned above have a look at picture *399 that is the WWAN from my tab. Your should be empty, same as for SIM slot and ribbon.

    Example of WWAN module on ebay. If link is removed the search for WWAN 3G module unlocked.
    New Unlocked Huawei EM770 3G WWAN Wireless Card Mobile Broadband Module | eBay

    my tab has a sierra wireless if I am correct, there is no such thing as "Fujitsu Original".
    Sierra Wireless - AirPrime MC8305
     
  9. thepinkpanter

    thepinkpanter Pen Pal - Newbie

    Messages:
    36
    Likes Received:
    3
    Trophy Points:
    16
    Sorry for my stupid previous question about the driver........
    before i opened the forum using the cellphone and I thought that your att. link was a driver.....
    just now I reopened the forum using my laptop and I realized that you att. photos only.....



    by the way I have all the below:
    1. Ribbon = http://www.ebay.com/itm/17103910933...l?_sacat=0&_from=R40&_nkw=171039109331&_rdc=1

    2. SIM slot module = http://www.fujitsu-ersatzteile.de/p...41&products_id=276048672269484720&language=en

    3. WWAN card + internal antenna cables - here you will need the drivers.

    I did test the non genuine Fujitsu Sierra MC7710 and nothing showing in the device manager and just to double check if the minicard is ok I have installed the minicard using an external USB wwan adapter and the minicard is working good.

    I did test the Genuine Gobi 2000 and it is working properly but only if I use the "Dial Up connection" because unfortunately the Gobi2000 doesn't have a compatible "One Click Internet" for windows 8 and the Aircard Watcher doesn't detect the Gobi2000.


    now I just bought the genuine Sierra MC8355 (gobi3000) which in the Fujitsu support sowing to have a compatible Aircard Watcher for windows 8,

    once I get the minicard I'll let you know the result.
     
    Last edited: Nov 3, 2013
  10. alexander123455

    alexander123455 Pen Pal - Newbie

    Messages:
    17
    Likes Received:
    0
    Trophy Points:
    5
    Were did you find other two screw under those two plugs?

    And, what plastic strip?
     

Share This Page