iwantfun-this is a certain to work method.using a different program then described above.this program deletes everything and replaces all of the files with any force neccesary.one way to ensure this is to make the program not interpret any of the data and give it all of the known unencryption keys, certificate's, and signature's in case it needs it. it would also have the administrative power [either though something fake,though hacking, or legit/real].it would replace the system with already hacked files, menu, etc. | iwantfun-this is a certain to work method.using a different program then described above.this program deletes everything and replaces all of the files with any force neccesary.one way to ensure this is to make the program not interpret any of the data and give it all of the known unencryption keys, certificate's, and signature's in case it needs it. it would also have the administrative power [either though something fake,though hacking, or legit/real].it would replace the system with already hacked files, menu, etc. |