Could someone post a tutorial on what exactly need to be changed in that file and what each of the involved lines do (and also what that faker prog does) please? I don't wanna just replace a system file with a version someone is distributing on the net without knowing thst is going on