All currently known Wii U exploits can, unlike e.g. the Nintendo Switch RCM exploit, be patched by a system update. Although the Wii U is no longer officially supported, Nintendo may still release updates for it. Namely the updates 5.5.3 and 5.5.4 were both released after the Wii U was discontinued, so blocking updates is still a recommended action.
### Instructions
Currently two ways exist to block updates on the Wii U system:
<!-- tabs:start -->
#### **Deleting the update folder**
?> While this method of update blocking is a bit more advanced than DNS Blocking and currently requires at least basic knowledge on FTP Programs, it has the advantage that the eShop's functionality will not be restricted.
> 8. On your PC run your preferred FTP client and open an FTP connection to your Wii U. In FileZilla this can be done using the Site Manager, but be sure to replace the IP address with the one shown on your Wii U screen:
?> This method is the easier method and is recommended to less advanced users. It does, however, prevent the eShop from working. This can be worked around by running [NNUPatcher](http://www.wiiubru.com/appstore/zips/nnupatcher.zip) before starting the eShop.
> 1. Plug your SD Card into your Computer.
> 2. Extract the `nnupatcher.zip` file to the root of your SD Card. If asked, overwrite any duplicate files.
> 3. Plug the SD Card into your Wii U console and power it on.
> 4. Enter the Wii U's system settings and navigate to `Internet > Connect to the Internet > Connection List >`
> `Your WiFi connection > Change Settings > DNS` and set the option to `Do not auto-obtain`.
> 5. You will be asked to input a primary and secondary DNS. Enter the following IP addresses: