05.03.2013 Views

Data Hacking

Data Hacking

Data Hacking

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

FIGURE 6-26: Use Find Next to search for the next<br />

instance of the string in the file.<br />

Chapter 6 — <strong>Hacking</strong> the Firmware<br />

8. When you find the appropriate string that you were searching for in the file, you can then<br />

use the keyboard to make changes to it (see Figure 6-27). It is safer to keep the edits you<br />

make the same length as the original word, so if you are replacing the word “WARNING”<br />

(which contains seven characters) with the word “DANGER” (which contains six characters),<br />

add white space to the term to make it the same length, so “ DANGER”.<br />

FIGURE 6-27: Making changes to the file<br />

9. When you are done searching through the file and making changes, you can save the file<br />

(see Figure 6-28).<br />

10. Load the firmware onto your GPS and test it out.<br />

FIGURE 6-28: Save your changes<br />

to the firmware.<br />

Magellan GPS Firmware Modifications<br />

So far, we’ve looked at modifying Garmin firmware. Let’s look briefly at modifying the<br />

firmware on the Magellan.<br />

143

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!