Changes

134 bytes removed ,  03:39, 26 September 2012
m
no edit summary
Line 35: Line 35:  
-a program that detects if usb cord is attached or has a manual ability called 'select a usb port'. it then sends a virus that enter's the dsi and deletes by force all security patches and replaces them with fakes/replacements.all security certificate's however are left untouched.
 
-a program that detects if usb cord is attached or has a manual ability called 'select a usb port'. it then sends a virus that enter's the dsi and deletes by force all security patches and replaces them with fakes/replacements.all security certificate's however are left untouched.
   −
-this is a likely to work method.using a different program then described above.this program deletes everything and replaces all of the files with any force neccesary.one way to ensure this is to make the program not interpret any of the data and give it all of the known unencryption keys, certificate's, and signature's in case it needs it. it would also have the administrative power [either though something fake,though hacking, or legit/real].it would replace the system with already hacked files, menu, etc.
+
-Different program then described above. This program deletes everything and replaces all of the files with any force neccesary. It also should have all of the known unencryption keys, certificate's, and signature's in case it needs them. It would also have the administrative power [though something fake,though hacking, or legit/real]. basicly, it replaces the system with already hacked files, menu, etc.
   −
-this will also likely work. hack a game download from the dsi store . replace the file thats downloaded from the dsi store with a dsi exploiting file, plus the game.
+
-Hack a game download from the dsi store . Replace the file thats downloaded from the dsi store with a dsi exploiting file, plus the game.
36

edits