general QoL updates from server experience (#1688)
Co-Authored-By: MechanicalDragon <mechdragon@mechanicaldragon.xyz>
This commit is contained in:
parent
442d9bb77b
commit
6676290017
4 changed files with 17 additions and 11 deletions
|
@ -71,12 +71,14 @@ If, before following this guide, you already had an EmuNAND setup and would like
|
|||
|
||||
1. Update your device by going to System Settings, then "Other Settings", then going all the way to the right and using "System Update"
|
||||
+ Updates while using B9S + Luma (what you have) are safe
|
||||
+ The updater may display a message saying "Your system is up to date" instead of updating. This is normal if you are already up to date
|
||||
+ If this gives you an error, set your DNS settings to "auto"
|
||||
+ If this still gives you an error, [follow CTRTransfer](ctrtransfer), then try updating again
|
||||
|
||||
#### Section III - Homebrew Launcher
|
||||
|
||||
1. Launch the Download Play application (![]({{ "/images/download-play-icon.png" | absolute_url }}){: height="24px" width="24px"})
|
||||
1. Wait until you see the two buttons
|
||||
1. Press (L) + (Down) + (Select) at the same time to open the Rosalina menu
|
||||
1. Select "Miscellaneous options"
|
||||
1. Select "Switch the hb. title to the current app."
|
||||
|
|
|
@ -81,9 +81,9 @@ If you would prefer a visual guide to this section, one is available [here](http
|
|||
1. Scroll left until reel "1/3" is selected
|
||||
1. Tap the fourth box with the letter "A" in it
|
||||
1. If the exploit was successful, your device will have loaded b9sTool
|
||||
1. Select "Install boot9strap"
|
||||
1. Follow the on-screen instructions to begin installation
|
||||
1. Exit b9sTool, then power off your device
|
||||
1. Using the D-Pad, move to "Install boot9strap"
|
||||
1. Press (A), then press START and SELECT at the same time to begin the process
|
||||
1. Once completed and the bottom screen says "done.", exit b9sTool, then power off your device
|
||||
+ You may have to force power off by holding the power button
|
||||
+ If you see the Luma Configuration screen, continue with the guide without powering off
|
||||
|
||||
|
@ -94,7 +94,7 @@ If you would prefer a visual guide to this section, one is available [here](http
|
|||
1. Use the (A) button and the D-Pad to turn on the following:
|
||||
+ **"Show NAND or user string in System Settings"**
|
||||
1. Press (Start) to save and reboot
|
||||
+ If you get a black screen, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap)
|
||||
+ Your device should load the Home Menu after a short delay. If you get a black screen lasting longer than 5 minutes, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap)
|
||||
|
||||
#### Section V - Restoring DS Connection Settings
|
||||
|
||||
|
|
|
@ -39,7 +39,9 @@ To extract the `.7z` and `.rar` files linked on this page, you will need a file
|
|||
1. Launch Frogtool from the list of homebrew
|
||||
1. Select the "INJECT patched DS Download Play" option
|
||||
1. Frogtool will automatically run and inject the JPN version of Flipnote Studio into your DS Download Play
|
||||
1. Once this operation has finished, tap the touchscreen and select "BOOT patched DS Download Play"
|
||||
1. Once this operation has finished, read the screens and check if the process was successful
|
||||
+ If there are any errors or missing files, correct the problem and try again
|
||||
1. If the process was successful, tap the touch screen, then select "BOOT patched DS Download Play"
|
||||
1. If the exploit was successful, your device will have loaded the JPN version of Flipnote Studio
|
||||
|
||||
#### Section III - Flipnote Exploit
|
||||
|
@ -59,9 +61,9 @@ If you would prefer a visual guide to this section, one is available [here](http
|
|||
1. Scroll left until reel "1/3" is selected
|
||||
1. Tap the fourth box with the letter "A" in it
|
||||
1. If the exploit was successful, your device will have loaded b9sTool
|
||||
1. Select "Install boot9strap"
|
||||
1. Follow the on-screen instructions to begin installation
|
||||
1. Exit b9sTool, then power off your device
|
||||
1. Using the D-Pad, move to "Install boot9strap"
|
||||
1. Press (A), then press START and SELECT at the same time to begin the process
|
||||
1. Once complete and the bottom screen says "done.", exit b9sTool, then power off your device
|
||||
+ You may have to force power off by holding the power button
|
||||
+ If you see the Luma configuration menu, continue without powering off
|
||||
|
||||
|
@ -72,7 +74,7 @@ If you would prefer a visual guide to this section, one is available [here](http
|
|||
1. Use the (A) button and the D-Pad to turn on the following:
|
||||
+ **"Show NAND or user string in System Settings"**
|
||||
1. Press (Start) to save and reboot
|
||||
+ If you get a black screen, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap)
|
||||
+ Your device should load the Home Menu after a short delay. If you get a black screen lasting longer than 5 minutes, [follow this troubleshooting guide](troubleshooting#black-screen-on-sysnand-boot-after-installing-boot9strap)
|
||||
|
||||
___
|
||||
|
||||
|
|
|
@ -42,8 +42,9 @@ There are two different methods for building on the Seedminer exploit (described
|
|||
|
||||
1. Insert your SD card into your computer
|
||||
1. Navigate to the `Nintendo 3DS` folder on your SD card
|
||||
1. Copy the 32 character long name of the folder you see
|
||||
+ If you see multiple folders like this, perform the following:
|
||||
1. Copy the 32 character long name of the folder you see inside Nintendo 3DS
|
||||
+ Do not go inside any more folders
|
||||
+ If you see multiple folders with long, random names inside `Nintendo 3DS` without opening any other folders, perform the following:
|
||||
+ Rename the `Nintendo 3DS` folder to `BACKUP_Nintendo 3DS`
|
||||
+ Reinsert your SD card into your device and power on your device
|
||||
+ Wait for the device to generate the SD card data
|
||||
|
@ -66,6 +67,7 @@ There are two different methods for building on the Seedminer exploit (described
|
|||
+ If the automated service is nonfunctional, join [Nintendo Homebrew on Discord](https://discord.gg/MWxPgEp) and ask (in English) for someone there to assist you
|
||||
1. Enter your device's Friend Code (with no spaces or dashes) into the "Your friend code" field
|
||||
1. Paste your device's 32 character long folder name into the "Your ID0" field
|
||||
+ Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section
|
||||
1. Complete the "I'm not a robot" captcha
|
||||
1. Select "Go"
|
||||
+ If the site immediately goes to step 4, download your `movable.sed` file and continue with the next section.
|
||||
|
|
Loading…
Reference in a new issue