DSi exploits: Difference between revisions
No edit summary |
mNo edit summary |
||
| Line 20: | Line 20: | ||
Rules | Rules | ||
→Do not Remove ideas, only add | 1.→Do not Remove ideas, only add | ||
→Do not Delete this section | 2.→Do not Delete this section | ||
→If your idea is 'Epic' mark it with * [only do this if it will certainly work] | 3.→If your idea is 'Epic' mark it with * [only do this if it will certainly work] | ||
→Here is a list of users that can modify this page [delete ideas] cause they know whats possible and not possible:yellows8. | 4.→Here is a list of users that can modify this page [delete ideas] cause they know whats possible and not possible:yellows8. | ||
→You must research whether your idea will work or not | 5.→You must research whether your idea will work or not | ||
-An emulator. | 6.→nobody, not even the users on the rule 4. list can shorten a detailed idea. | ||
-An emulator/simulator,like the one for ipods. | |||
-This will help speed development of a hack. A full decryption of the entire dsi system[this is for hardcore devs]. | -This will help speed development of a hack. A full decryption of the entire dsi system[this is for hardcore devs]. | ||
-If a dsi even has ports [the stuff firewalls protect] a port scan. | -If a dsi even has ports [the stuff firewalls protect] a port scan. | ||