1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

DNLA Server - Alternative Strategy?

Discussion in 'HDR-FOX T2 Freeview Recorder' started by Black Hole, May 21, 2011.

  1. Black Hole

    Black Hole Trick Cyclist

    Been thinking:

    Assuming I installed the hack and had a DNLA server running on the Hummy, I would *possibly* be able to stream content to a Digital Stream box elsewhere on the network (my goal).

    But: the Hummy would have to be on and not in danger of starting a scheduled recording (there are indications it doesn't have enough horse-power to do both), and in order to prepare a recording to be streamed I would have to telnet into the Hummy and clear the Enc flag (assuming it's HD), then (with a USB stick plugged in) use the handset to copy the files onto the USB or a virtual disc.

    It seems to me I might as well copy (decrypt) the files to a real USB drive, then plug the drive into a network DNLA server. That being the case, I can FTP the relevant file to Foxy the enc flag, and then I don't need to hack the Hummy at all, but it still means two processes: one from the PC and another standing in front of the Hummy.

    What would be really good, if anybody with the skills would like to look at it, is to use the Hummy-installed mht utility (the equivalent of Foxy) to implement an addition to the OPT+ menu to clear the enc flag, thus making it accessible from the handset rather than having to use a PC.
     
  2. rogdog

    rogdog Member

    Maybe Af123's "auto-unprotect" package would do what you want.

    http://www.hummy.tv/forum/posts/2863/

     
  3. Black Hole

    Black Hole Trick Cyclist

    Good point, I had forgotten about that.

    Still, a customised on-screen menu with a "clear enc flag" option would be really cool!
     
  4. Black Hole

    Black Hole Trick Cyclist

    Okay, I've had a rethink and come up with a less sophisticated scheme with fewer potential pitfalls:

    Get auto-unprotect running; then use "sneakernet" to distribute recordings - dedicate a USB drive to copy onto (a necessary operation for decryption) and physically move the drive to the playback location.

    Please can somebody describe step-by-step the process of getting auto-unprotect running in the background? I know it involves loading the patched firmware just like a manual update and then logging into it by Telnet, but what then?
     
  5. af123

    af123 Administrator Staff Member

    Having gained command access via telnet, just type:

    Code:
    humax# opkg update
    humax# opkg install auto-unprotect
    
     
    Black Hole likes this.
  6. Black Hole

    Black Hole Trick Cyclist

    That's all? Great :)