Changes

519 bytes removed ,  00:02, 17 July 2010
Line 9: Line 9:       −
The DSi [[Nintendo Zone]] client has a bug that can used to run some homebrew. Linux/hostapd compatible box is required and only certain Wifi NICs can be used with hostapd. It's unknown if it's possible to use a flash card or a SD card with this exploit, it's unknown if sysmenu locks out either of those. [[User:Yellows8|Yellows8]]'s [[Nintendo Zone#Exploits|nzoneurlstacksmash]] should work with DSi NZone. This exploit can't be tested with DSi [[User:Yellows8|until]] Nintendo Zone AP beacons captures are obtained, to clone a Nintendo Zone AP at home. Currently the only NZone AP SSID that could be released once obtained is the NYC N World Store NZone SSID, but it probably isn't possible to use the exploit with that SSID since all html on the server was probably moved to HTTPS. Probably the only way to exploit NZone is with an AP location that has third-party content with an external server which is all NZone locations except N World Store. [[User:Yellows8|Yellows8]] can't confirm that all html was moved to HTTPS until he gets a NZone SSID. Since the index main screen html was moved to HTTPS and DS Station uses HTTP with a different URL, the NZone client can't be used with the DS Station server. Thus, only NZone AP SSIDs can be used with the NZone client. If all html really was moved to only HTTPS, a different SSID would be needed for release besides the NYC SSID. The only locations in the following list that could be usable with the exploit and could be released, is the Best Buy locations, and Japan. that Nintendo Zone is only available in Japan, at Nintendo World Store in New York City, and a few McDonalds test locations in [http://translate.google.com/translate?langpair=de|en&u=http%3A%2F%2Fnintendo.de%2FNOE%2Fde_DE%2Fnews%2Fevents%2Fpilotprojekt_-_nintendo_zone_bei_mcdonalds_18254.html Germany]. The test Germany locations are only available for a limited time, see the URL. Several USA Best Buy locations started a NZone test service in June 2009, see [http://gonintendo.com/viewstory.php?id=84077 this]. It's unknown if those Best Buy locations still have NZone.
+
The DSi [[Nintendo Zone]] client has a bug that can used to run some homebrew. Linux/hostapd compatible box is required and only certain Wifi NICs can be used with hostapd. It's unknown if it's possible to use a flash card or a SD card with this exploit, it's unknown if sysmenu locks out either of those. [[User:Yellows8|Yellows8]]'s [[Nintendo Zone#Exploits|nzoneurlstacksmash]] should work with DSi NZone. This exploit can't be tested with DSi [[User:Yellows8|until]] Nintendo Zone AP beacons captures are obtained, to clone a Nintendo Zone AP at home. Since the index main screen html was moved to HTTPS and DS Station uses HTTP with a different URL, the NZone client can't be used with the DS Station server. Thus, only NZone AP SSIDs can be used with the NZone client. The only locations in the following list that could be usable with the exploit and could be released once obtained, is the Best Buy locations, and Japan. Nintendo Zone is available in Japan. Nintendo World Store in New York City used to have NZone, but they don't have NZone or even DS Download Station anymore. A few McDonalds test locations in [http://translate.google.com/translate?langpair=de|en&u=http%3A%2F%2Fnintendo.de%2FNOE%2Fde_DE%2Fnews%2Fevents%2Fpilotprojekt_-_nintendo_zone_bei_mcdonalds_18254.html Germany] have NZone. The test Germany locations are only available for a limited time, see the URL. Several USA Best Buy locations started a NZone test service in June 2009, see [http://gonintendo.com/viewstory.php?id=84077 this]. It's unknown if those Best Buy locations still have NZone.
    
== DS-mode exploits ==
 
== DS-mode exploits ==