In memory of Ben “bushing” Byer, who passed away on Monday, February 8th, 2016.

Changes

Jump to navigation Jump to search
16 bytes added ,  18:07, 10 August 2009
m
Robot: Cosmetic changes
Line 16: Line 16:  
-->__NOTOC__
 
-->__NOTOC__
   −
==A==
+
== A ==
 
;AES
 
;AES
 
:Stands for Advanced Encryption Standard. It is used for encryption on the Wii.
 
:Stands for Advanced Encryption Standard. It is used for encryption on the Wii.
Line 24: Line 24:  
:The CBC (Cipher Block Chaining) mode of AES with a 128 bit key, that is used on the Wii.
 
:The CBC (Cipher Block Chaining) mode of AES with a 128 bit key, that is used on the Wii.
   −
==B==
+
== B ==
 
;Backup
 
;Backup
 
:A copy of a game that has been dumped from the original disc in case it should become unusable due to wear/damage. Since the same method is used to pirate games, they are not discussed or encouraged here.
 
:A copy of a game that has been dumped from the original disc in case it should become unusable due to wear/damage. Since the same method is used to pirate games, they are not discussed or encouraged here.
Line 35: Line 35:     
;Banner Brick
 
;Banner Brick
:An error preventing the Wii's channel menu from displaying. It occurs when a WAD is installed with a banner that uses the wrong image sizes.
+
:An error preventing the Wii's channel menu from displaying. It occurs when a WAD is installed with a banner that uses the wrong image sizes.
 
:''See also: System Menu, Brick, Semi-Brick, WAD.''
 
:''See also: System Menu, Brick, Semi-Brick, WAD.''
   Line 43: Line 43:     
;Binary
 
;Binary
:A term used to describe the base 2 number system when used with electronics. As slang, it also refers to an executable file.
+
:A term used to describe the base 2 number system when used with electronics. As slang, it also refers to an executable file.
    
;Bit
 
;Bit
Line 62: Line 62:     
;Brick
 
;Brick
:A console that is no longer working due to damaged hardware or an error with the internal software/filesystem. Usually the fault of the owner. Sometimes recoverable through special means.  
+
:A console that is no longer working due to damaged hardware or an error with the internal software/filesystem. Usually the fault of the owner. Sometimes recoverable through special means.  
    
;Brick Recovery
 
;Brick Recovery
Line 76: Line 76:  
:Eight bits, on all modern processors; the smallest number of bits that can be sent to/from memory at a time.
 
:Eight bits, on all modern processors; the smallest number of bits that can be sent to/from memory at a time.
   −
==C==
+
== C ==
 
;C
 
;C
 
:A language homebrew developers program in.
 
:A language homebrew developers program in.
Line 101: Line 101:     
;[[User:Comex|Comex]]
 
;[[User:Comex|Comex]]
:Author of the [[Bannerbomb]] hack and primary author of a derivative of the [[Twilight Hack]] involving the stage loader in Super Smash Brothers Brawl. Comex has also worked on a variety of other homebrew related projects, often in collaboration with other coders. He is not a member of [[Team Twiizers]].
+
:Author of the [[Bannerbomb]] hack and primary author of a derivative of the [[Twilight Hack]] involving the stage loader in Super Smash Brothers Brawl. Comex has also worked on a variety of other homebrew related projects, often in collaboration with other coders. He is not a member of [[Team Twiizers]].
    
;Compile
 
;Compile
Line 107: Line 107:  
:''See also: Source, Binary.''
 
:''See also: Source, Binary.''
   −
==D==
+
== D ==
 
;Dev
 
;Dev
 
:See: "Homebrew Developer".
 
:See: "Homebrew Developer".
Line 121: Line 121:  
:To extract the protected contents of something like a chip or NAND drive or disc which are otherwise inaccessible and/or incomprehensible under normal circumstances.
 
:To extract the protected contents of something like a chip or NAND drive or disc which are otherwise inaccessible and/or incomprehensible under normal circumstances.
   −
==E==
+
== E ==
 
;Electronic Gate
 
;Electronic Gate
 
:A device which takes electronic signals (inputs) and outputs a signal based on the status of its inputs. Some examples of electronic gates are AND, OR, NOT, NAND, NOR, and XOR.
 
:A device which takes electronic signals (inputs) and outputs a signal based on the status of its inputs. Some examples of electronic gates are AND, OR, NOT, NAND, NOR, and XOR.
Line 133: Line 133:     
;Encryption
 
;Encryption
:Encryption is a common security measure used to obscure information, making it unintelligible unless a special "key" is applied during the reading process, thus "unlocking" it. A simplistic example would be to replace the letters in a text message with corresponding numbers so that only someone who knows which numbers represent the correct letters would be able to read the message; however, true encryption is much more complex and secure than this.
+
:Encryption is a common security measure used to obscure information, making it unintelligible unless a special "key" is applied during the reading process, thus "unlocking" it. A simplistic example would be to replace the letters in a text message with corresponding numbers so that only someone who knows which numbers represent the correct letters would be able to read the message; however, true encryption is much more complex and secure than this.
    
;Exploit
 
;Exploit
:A clever circumvention of security allowing a user to perform tasks that are not normally permitted. Often several exploits will be employed in a series with the user gaining increased authority over a system at each step, the goal typically being complete access and control.
+
:A clever circumvention of security allowing a user to perform tasks that are not normally permitted. Often several exploits will be employed in a series with the user gaining increased authority over a system at each step, the goal typically being complete access and control.
 
:''See also: Stack Overflow, Twilight Hack, Fakesign, BootMii.''
 
:''See also: Stack Overflow, Twilight Hack, Fakesign, BootMii.''
   −
==F==
+
== F ==
 
;Fakesign
 
;Fakesign
 
:Homebrew that exploits a bug in the Wii's signature handling to bypass the digital signature. This exploit was fixed in IOSes distributed with system menu version 3.3.
 
:Homebrew that exploits a bug in the Wii's signature handling to bypass the digital signature. This exploit was fixed in IOSes distributed with system menu version 3.3.
Line 148: Line 148:     
;Firmware
 
;Firmware
:Fixed low-level code written directly into a programmable chip. The Wii's system menu software is NOT firmware, despite what some misguided people may think.
+
:Fixed low-level code written directly into a programmable chip. The Wii's system menu software is NOT firmware, despite what some misguided people may think.
   −
==G==
+
== G ==
 
;GPU
 
;GPU
 
:Graphics Processing Unit, responsible for rendering everything you see on screen.
 
:Graphics Processing Unit, responsible for rendering everything you see on screen.
 
:''See also: Hollywood.''
 
:''See also: Hollywood.''
   −
==H==
+
== H ==
 
;Hackmii
 
;Hackmii
 
:The development blog of Team Twiizers.
 
:The development blog of Team Twiizers.
    
;Hash
 
;Hash
:A way of verifying file integrity, often as a security measure. Basically, a hash function is used when examining a file, outputting a short string or integer. This value can be stored for later comparison. If the file has been altered, repeating the same process with the same hash function will produce a different result. When the result is compared to the stored value, if it does not match, it is an indication that the file cannot be trusted.
+
:A way of verifying file integrity, often as a security measure. Basically, a hash function is used when examining a file, outputting a short string or integer. This value can be stored for later comparison. If the file has been altered, repeating the same process with the same hash function will produce a different result. When the result is compared to the stored value, if it does not match, it is an indication that the file cannot be trusted.
    
;Hexadecimal (Hex)
 
;Hexadecimal (Hex)
Line 184: Line 184:  
:Refers to someone who develops Wii homebrew applications.
 
:Refers to someone who develops Wii homebrew applications.
   −
==I==
+
== I ==
 
;[[IOS]]
 
;[[IOS]]
 
:Input/Output System. These programs run on the [[Starlet]] coprocessor and control access to Wii hardware and security.
 
:Input/Output System. These programs run on the [[Starlet]] coprocessor and control access to Wii hardware and security.
Line 193: Line 193:     
;Infectus
 
;Infectus
:A modchip that can read and write data to and from the Wii's internal NAND. Very useful for hacking.
+
:A modchip that can read and write data to and from the Wii's internal NAND. Very useful for hacking.
 
:''See also: Modchip.''
 
:''See also: Modchip.''
   −
==L==
+
== L ==
 
;Library
 
;Library
 
:Generally given the extension *.a, a library is a compilation of source code that may be linked into a program.
 
:Generally given the extension *.a, a library is a compilation of source code that may be linked into a program.
   −
==M==
+
== M ==
 
;[[User:marcan|Marcan]]
 
;[[User:marcan|Marcan]]
 
:A formerly predominant member of [[Team Twiizers]].
 
:A formerly predominant member of [[Team Twiizers]].
Line 208: Line 208:     
;Modchip
 
;Modchip
:A device containing simple firmware that is usually soldered or clipped onto a circuit board typically for the purpose of altering or circumventing the normal functions of a device. In a game console, a modchip almost always serves to enable the playing of backup and/or pirated copies of games.
+
:A device containing simple firmware that is usually soldered or clipped onto a circuit board typically for the purpose of altering or circumventing the normal functions of a device. In a game console, a modchip almost always serves to enable the playing of backup and/or pirated copies of games.
   −
==N==
+
== N ==
;[[NAND_Flash_layout|NAND]]
+
;[[NAND Flash layout|NAND]]
 
:Typically refers to the Wii's internal storage, which uses a NAND-based flash chip. The term actually stands for Not-AND; an electronic gate whose output is low only when all inputs are high.
 
:Typically refers to the Wii's internal storage, which uses a NAND-based flash chip. The term actually stands for Not-AND; an electronic gate whose output is low only when all inputs are high.
 
:''See also: Flash.''
 
:''See also: Flash.''
   −
==P==
+
== P ==
 
;Partial Brick
 
;Partial Brick
 
:See "Semi-Brick".
 
:See "Semi-Brick".
    
;PCB
 
;PCB
:Printed Circuit Board. The Wii has a few of these, most notably the mainboard containing all the crucial parts and the game disc drive's control board where modchips are typically installed.
+
:Printed Circuit Board. The Wii has a few of these, most notably the mainboard containing all the crucial parts and the game disc drive's control board where modchips are typically installed.
    
;PPC
 
;PPC
:PowerPC; Power Performance Computing. The processing architecture of the Gamecube and Wii consoles. Also used in the XBOX 360 and Playstation 3.
+
:PowerPC; Power Performance Computing. The processing architecture of the Gamecube and Wii consoles. Also used in the XBOX 360 and Playstation 3.
   −
==R==
+
== R ==
 
;RSA
 
;RSA
 
:An encryption/digital signature algorithm used by the Wii. When implemented correctly it is too strong to be broken with modern technology. The acronym is made from the names of its inventors.
 
:An encryption/digital signature algorithm used by the Wii. When implemented correctly it is too strong to be broken with modern technology. The acronym is made from the names of its inventors.
   −
==S==
+
== S ==
 
;SD Card
 
;SD Card
 
:A common type of memory card, used by the Wii, digital cameras, music players, etc. Stands for Secure Digital.
 
:A common type of memory card, used by the Wii, digital cameras, music players, etc. Stands for Secure Digital.
    
;SDHC
 
;SDHC
:Stands for Secure Digital High Capacity Card. A type of SD card with a higher storage capacity than normal SD cards.
+
:Stands for Secure Digital High Capacity Card. A type of SD card with a higher storage capacity than normal SD cards.
    
;SDK
 
;SDK
Line 246: Line 246:     
;Soldering
 
;Soldering
:The process of attaching two or more metal components by melting additional metal directly onto them. This process is used to add components onto circuit boards.
+
:The process of attaching two or more metal components by melting additional metal directly onto them. This process is used to add components onto circuit boards.
    
;Source
 
;Source
Line 255: Line 255:     
;Stack Overflow
 
;Stack Overflow
:Simply put: Bad coding that makes the stack crash. There are a number of ways to do this. It can lead to an exploit in some cases. An exploit using a stack overflow is sometimes called a "Stack smash" attack.
+
:Simply put: Bad coding that makes the stack crash. There are a number of ways to do this. It can lead to an exploit in some cases. An exploit using a stack overflow is sometimes called a "Stack smash" attack.
 
:''See also: Twilight Hack.''
 
:''See also: Twilight Hack.''
   Line 268: Line 268:  
:The Wii's main interface which appears after the health warning screen when the system is powered on. It is loaded after boot2. It allows the user to start channels, manage data, and change settings.
 
:The Wii's main interface which appears after the health warning screen when the system is powered on. It is loaded after boot2. It allows the user to start channels, manage data, and change settings.
   −
==T==
+
== T ==
 
;[[Team Twiizers]]
 
;[[Team Twiizers]]
 
:A team of people who have created many hacks for the Wii including the [[Homebrew Channel]], the [[Twilight Hack]], and [[DVDX]].
 
:A team of people who have created many hacks for the Wii including the [[Homebrew Channel]], the [[Twilight Hack]], and [[DVDX]].
Line 285: Line 285:     
;[[Title]]
 
;[[Title]]
:A title is a Wii game on a disc, a Wii channel or a virtual console game. A title is identified by a unique title ID, an 8 byte (4 character) long code used for title identification. All titles are encrypted for security purposes.
+
:A title is a Wii game on a disc, a Wii channel or a virtual console game. A title is identified by a unique title ID, an 8 byte (4 character) long code used for title identification. All titles are encrypted for security purposes.
    
;[[Title metadata|Title Metadata]]
 
;[[Title metadata|Title Metadata]]
Line 297: Line 297:     
;[[Tweezer Attack]]
 
;[[Tweezer Attack]]
:Involving some Gamecube homebrew code running on the Wii in combination with a pair of tweezers, the Tweezer Attack is what allowed hackers access to the locked portions of the Wii normally invisible when the machine is running in Gamecube compatibility mode. It allowed the creation of true Wii homebrew.
+
:Involving some Gamecube homebrew code running on the Wii in combination with a pair of tweezers, the Tweezer Attack is what allowed hackers access to the locked portions of the Wii normally invisible when the machine is running in Gamecube compatibility mode. It allowed the creation of true Wii homebrew.
    
;[[Twilight Hack]]
 
;[[Twilight Hack]]
 
:A hacked save game with a loader embedded in it for the Wii game The Legend of Zelda the Twilight Princess. The file exploits a buffer overflow to take control of the system and run a program found on the SD card, such as the [[Homebrew Channel]] installer.
 
:A hacked save game with a loader embedded in it for the Wii game The Legend of Zelda the Twilight Princess. The file exploits a buffer overflow to take control of the system and run a program found on the SD card, such as the [[Homebrew Channel]] installer.
   −
==V==
+
== V ==
 
;[[VC]]
 
;[[VC]]
 
:See "Virtual Console".
 
:See "Virtual Console".
Line 309: Line 309:  
:A phrase invented by Nintendo so that they didn't have to use the word "emulator".
 
:A phrase invented by Nintendo so that they didn't have to use the word "emulator".
   −
==W==
+
== W ==
 
;[[WAD]]
 
;[[WAD]]
 
:An archive format that channels and updates are contained in.
 
:An archive format that channels and updates are contained in.
1,189

edits

Navigation menu