Solved

My 2003 Land Rover discovery 2 key for code for car alarm

Posted on 2016-09-04
7
106 Views
Last Modified: 2016-09-10
Hello all, I am trying to get the programming code for my alarm so I can use it on my vehicle the six key characters are 2248CE. I know very little about how these mathematics work so I will give you the link. I would appreciate any help thanks.

 http://landroverforums.com/forum/attachments/discovery-ii-18/15338d1365184693-used-key-fobs-disco2_fobcode_worksheet_20130405.pdf
0
Comment
Question by:Paul Pullini
  • 3
  • 3
7 Comments
 
LVL 35

Expert Comment

by:mccarl
ID: 41787194
I know very little about how these mathematics work
There is very little in the that is particularly mathematical, just some basic addition, subtraction and division. All you need to do is to follow along with what looks like fairly simple written instructions. Besides, there is a step in there about choosing the"fob type" which we would have no idea about. And it sounds like you have to do a bit of trial and error with that fob type anyway.

I'd suggest having a go at following the instructions and if you get stuck at a particular point, ask a specific question here.
1
 

Author Comment

by:Paul Pullini
ID: 41787278
Thank you for the help. The fob type is just the location where it was distributed which is North America and the symbol for it is J. Ok thanks again I appreciate any help I will see how it works.
0
 

Author Comment

by:Paul Pullini
ID: 41787298
These two are an example of what I am trying to get these are programming codes without these I can not bring my key fob to dealer to program it for my Land Rover discovery. So I need those two bar codes figured out before I go to a Land Rover dealership. Thanking anyone who could get me the two bar codes correctly again the character keys are 2248CE.
image.jpeg
image.jpeg
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 35

Accepted Solution

by:
mccarl earned 500 total points
ID: 41787310
1a                2 2 4 8 C E
1b                2 2 4 8 12 14
1c                42
2a                2 2 4 8 C D
2b                2 2 4 8 12 13
2c                41
3                 D D B 7 3 1
4a                J
4b                19
5a                132
5b                3
5c                3
6                *J2248CE2248CDFF3*

7a                168
7b                39
7c                $
8                *FFFFFFFFDDB731$*
1
 

Author Closing Comment

by:Paul Pullini
ID: 41790839
Thank you so much now I can go to dealership and match the fob with alarm I will keep you up to date if it worked. Thanks again😊
0
 
LVL 35

Expert Comment

by:mccarl
ID: 41792279
You're welcome!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article is meant to give a basic understanding of how to use R Sweave as a way to merge LaTeX and R code seamlessly into one presentable document.
This article provides a brief introduction to tissue engineering, the process by which organs can be grown artificially. It covers the problems with organ transplants, the tissue engineering process, and the current successes and problems of the tec…
Viewers will learn how to properly install Eclipse with the necessary JDK, and will take a look at an introductory Java program. Download Eclipse installation zip file: Extract files from zip file: Download and install JDK 8: Open Eclipse and …
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now