Can I ask what all the hoopla is all about, the UC hard drive is nothing difficult at all to figure out, its simply masking its FAT table to hide the files, all that was needed was a writing a very simple sector scanner to locate the beginning and end of each of the files (which for whatever reason don't start until sector 38535672 and are less then 100mb's total in that 40gb hd, I extracted out 5 executable files - a 64K file called jver.exe, then a 934K and 3 large files - 15mb's, 20mb's and 26mb's. They are located in the EXE_DIR and then in the WAV_DIR are all of the wav files for the sound effects for the menu (I found 16 seperate wav files).
Oh and BTW - in the beginning of the drive is the darnedest thing - what appears to be a Fat12 floppy image in the beginning of the HD (or at least on first pass, that's what it looks like) with the jboot (I wonder if it is the same as Scott Bradford's Jdyne Technologies Jboot protection software), then some other files like jtpboot and sappboot, I also found sapphire drivers load scripting commands.
Now, I haven't gotten all of the EXE's running - yet, but an ascii sector view of the 15mb exe turned up something interesting... the Atari games appear to actually be from Atari Arcade Hits Vol 1 and Vol2 as I found ascii text referring to them and (c) Infogrames, so that's rather interesting. I will say this much, I see no signs whatsoever of MAME of any kind or iteration at all. Now jboot (if it is in fact the same as the jdyne version and the Atari arcade hits - they all use Win32 API's and DirectX, so the next question to be answered is, does the joshua mbr bootloader run some kind of DOS with win32 APIs and then, what about Directx? Drive loads amazingly fast, so its rather interesting to see in more detail just what these remaining exe's actually are and what they are up to.
Please DO NOT email me to ask for the files, this was simply an exercise of fun to see what was on the drive, I've given pretty much everything needed to know about the drive and what you'd have to do on your own to access its contents, and that is all I can give anyone is information, the code from the drive is not something that can or will be released. I know that no one here seems to be a fan of ultracade (the signature pic's of poo on the ultracade equipment kind of gives it away) but in all fairness, to post the drives contents publicly would be far worse then I think anything that ultracade may have done against the mame groups.
Arcade On !