DSi exploits: Difference between revisions

Iwantfun (talk | contribs)
No edit summary
Iwantfun (talk | contribs)
mNo edit summary
Line 20: Line 20:
Rules
Rules


→Do not Remove ideas, only add
1.→Do not Remove ideas, only add


→Do not Delete this section
2.→Do not Delete this section


→If your idea is 'Epic' mark it with * [only do this if it will certainly work]
3.→If your idea is 'Epic' mark it with * [only do this if it will certainly work]
   
   
→Here is a list of users that can modify this page [delete ideas] cause they know whats possible and not possible:yellows8.
4.→Here is a list of users that can modify this page [delete ideas] cause they know whats possible and not possible:yellows8.


→You must research whether your idea will work or not
5.→You must research whether your idea will work or not


-An emulator.
6.→nobody, not even the users on the rule 4. list can shorten a detailed idea.
 
-An emulator/simulator,like the one for ipods.  


-This will help speed development of a hack. A full decryption of the entire dsi system[this is for hardcore devs].
-This will help speed development of a hack. A full decryption of the entire dsi system[this is for hardcore devs].


-If a dsi even has ports [the stuff firewalls protect] a port scan.
-If a dsi even has ports [the stuff firewalls protect] a port scan.