May be slightly related to the fact that you're using a hacking device to subvert the programming in order to access an inaccessible area... *shrug*
On a more serious note, you should probably double check your method, and make sure you're doing all the naughty things correctly. Even a small difference can have wild results.