Full version incl Webif, monitor and all the usual card reader
Tested positive for Single Spark + triplex
Unpack the archive, then "plugins" folder and its contents contained on a USB flash drive (FAT32) copy.
On the infected machine, then a pop-up message.
Follow the instructions - that's it.
The Oscam configs are located by default in / var / tuxbox / config /
The Webif is accessible via the IP-box: 88
there you can see all the predefined reader, it can switch on and off.
To enable simple in Webif> READERS Click on LOCK!
ضع تعليق باستخدام حساب الفيس بوك