As a result of severe experimenting with our Himalayas I'm sure that many have killed their devices in the process. One of the worst things you can do to your device is overwrite your device with a bad corrupt bootloader image. This will surely kill your device. Even the service center wouldn't be able to identify the problem and they would usually recommend a new PCB (mainboard) for your phone. I started this page in hope to find a solution for this mess. I've been reading alot and screening the net for any information helping to revive dead Himalayas and so far I've been succesful in collecting very interesting data.
First lets Describe the JTAG Protocol. JTAG is a protocol designed to do in-circuit testing and debugging of hardware devices and circuit boards. Although JTAG allows very advanced means of debugging, the main purpose of this exercise so far was to reach the possibility of flashing the ROM without a bootloader or repairing a corrupt bootloader.
So far I've been able to collect data that proves successful attempts to use JTAG on the Wallaby and the IPAQ 3600. The key to success is to identify the testing points on the PCB(Mainboard) inorder to gain access to the ARM processor. Here below, you will see both PCBs for the Wallaby and the IPAQ 3600 and the identified testing points needed to access the corrupt ARM processer through which we will then access either the Flash ROM or the Bootloader.
The WALLABY's Test Pionts on its PCB :
-To be continued !!