Changes

192 bytes removed ,  03:30, 26 September 2012
m
no edit summary
Line 23: Line 23:  
→do not delete this section
 
→do not delete this section
   −
iwantfun-a hack using download play
+
-a hack using download play
   −
iwantfun-an simulator/emulator like the one for ipod [this is to help hacking development]
+
-a simulator/emulator like the one for ipod [to help hacking development]
   −
iwantfun-a costom headphone jack that plugs into computer [usb] and can access dsi files or softmod from a computer program
+
-a costom headphone jack that plugs into computer [usb] and can access dsi files or softmod using a computer program
   −
iwantfun-there is 4 game [dsi shop] exploits that work on all system versions exept latest.make more of them.
+
-there is 4 game [dsi shop] exploits that work on all system versions exept the latest.make more of them.
   −
iwantfun-a costom charger cord with usb that plugs into computer and a program described below
+
-a costom charger cord with usb that plugs into computer and a program described below
   −
iwantfun-a program that detects if usb cord is attached or has a manual ability called 'select a usb port'. then it sends a virus that enter's the dsi [ or any unfortionate device u forgot to unplug] and deletes by force all security files and replaces them with fakes/replacements.all security certificate's however are left untouched.I am not liable for any damages caused by this on said 'unfortunate' devices.
+
-a program that detects if usb cord is attached or has a manual ability called 'select a usb port'. it then sends a virus that enter's the dsi and deletes by force all security patches and replaces them with fakes/replacements.all security certificate's however are left untouched.
   −
iwantfun-this is a likely to work method.using a different program then described above.this program deletes everything and replaces all of the files with any force neccesary.one way to ensure this is to make the program not interpret any of the data and give it all of the known unencryption keys, certificate's, and signature's in case it needs it. it would also have the administrative power [either though something fake,though hacking, or legit/real].it would replace the system with already hacked files, menu, etc.
+
-this is a likely to work method.using a different program then described above.this program deletes everything and replaces all of the files with any force neccesary.one way to ensure this is to make the program not interpret any of the data and give it all of the known unencryption keys, certificate's, and signature's in case it needs it. it would also have the administrative power [either though something fake,though hacking, or legit/real].it would replace the system with already hacked files, menu, etc.
   −
iwantfun-this will also likely work. hack a game download from the dsi store . replace the file thats downloaded from the dsi store with a dsi exploiting file, plus the game.
+
-this will also likely work. hack a game download from the dsi store . replace the file thats downloaded from the dsi store with a dsi exploiting file, plus the game.
36

edits