Re: [Verizon] Has Anyone Hacked the secdialer.dll to disable the touchscreen lock?
The hex editing part is easy, although I have questions about multiple instances of the target string "Touchlock" that occur in places with different capitalization "Touchlock" versus "TouchLock" and a place with "TouchLockStatusNotification", "TouchLockStatusNotifyCallback" and "TouchLocked" as well as what looks like a function call "TouchLock(%d)"
Beyond that, I couldn't seem to successfully re-sign the DLL and got unsigned warnings at startup and the WM6 default dialer took over.
|