This commit is contained in:
Plailect 2016-11-16 13:18:18 -05:00 committed by Plailect
parent 4acaf2a5db
commit 7e47a0054b
No known key found for this signature in database
GPG key ID: F8A415C5EA602A41
3 changed files with 5 additions and 0 deletions

View file

@ -49,6 +49,7 @@ You should be in Decrypt9 for these steps.
7. Press (Select) to eject your SD card, then put it in your computer
8. Delete all `.tik` files in the `/files9/` folder that **do not** start with "00-"
9. Leave all the `.tik` files that do start with "00-" in the folder
+ If none start with "00-", then just continue.
10. Reinsert your SD card into your 3DS, then press (B)
##### Section III - ctrtransfer

View file

@ -44,6 +44,7 @@ If you have already hacked your 3DS before and have a EmuNAND based CFW setup, t
7. Press (Select) to eject your SD card, then put it in your computer
8. Delete all `.tik` files in the `/files9/` folder that **do not** start with "00-"
9. Leave all the `.tik` files that do start with "00-" in the folder
+ If none start with "00-", then just continue.
10. Reinsert your SD card into your 3DS, then press (B)
##### Section III - ctrtransfer

View file

@ -199,6 +199,9 @@ If, before following this guide, you already had an EmuNAND setup and would like
This section is only needed for devices that did a ctrtransfer earlier and had to back up their tickets.
{: .notice--info}
If you have no tickets to restore, skip this section.
{: .notice--info}
1. Open FBI
2. Select "SD"
3. Select "files9"