Deploying to gh-pages from @ hacks-guide/Guide_3DS@a4de340eb4 🚀

This commit is contained in:
lifehackerhansol 2023-04-08 23:29:00 +00:00
parent 31faa8737f
commit 962a8d4748
3 changed files with 3 additions and 3 deletions

View file

@ -1 +1 @@
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.3.2">Jekyll</generator><link href="https://3ds.hacks.guide/feed.xml" rel="self" type="application/atom+xml" /><link href="https://3ds.hacks.guide/" rel="alternate" type="text/html" /><updated>2023-04-08T22:20:20+00:00</updated><id>https://3ds.hacks.guide/feed.xml</id><title type="html">3DS Hacks Guide</title><subtitle>A complete guide to 3DS custom firmware</subtitle><author><name>Nintendo Homebrew</name></author></feed>
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.3.2">Jekyll</generator><link href="https://3ds.hacks.guide/feed.xml" rel="self" type="application/atom+xml" /><link href="https://3ds.hacks.guide/" rel="alternate" type="text/html" /><updated>2023-04-08T23:28:45+00:00</updated><id>https://3ds.hacks.guide/feed.xml</id><title type="html">3DS Hacks Guide</title><subtitle>A complete guide to 3DS custom firmware</subtitle><author><name>Nintendo Homebrew</name></author></feed>

View file

@ -576,7 +576,7 @@ window.cookieconsent.initialise({
<h3 id="next-step-bannerbomb3">Next step: BannerBomb3</h3>
<p>Once you have your devices encryption key (<code class="language-plaintext highlighter-rouge">movable.sed</code>), you will use it in conjunction with BannerBomb3, which uses your <code class="language-plaintext highlighter-rouge">movable.sed</code> file to take advantage of exploits in the System Settings application.</p>
<p>Once you have your devices encryption key (<code class="language-plaintext highlighter-rouge">movable.sed</code>), you can use it in conjunction with BannerBomb3, which uses your <code class="language-plaintext highlighter-rouge">movable.sed</code> file to take advantage of exploits in the System Settings application.</p>
<p class="notice--primary">Continue to <a href="bannerbomb3-fredtool-(twn)">BannerBomb3 + Fredtool (TWN)</a></p>

View file

@ -577,7 +577,7 @@ window.cookieconsent.initialise({
<h3 id="next-step-bannerbomb3">Next step: BannerBomb3</h3>
<p>Once you have your devices encryption key (<code class="language-plaintext highlighter-rouge">movable.sed</code>), you will use it in conjunction with BannerBomb3, which uses your <code class="language-plaintext highlighter-rouge">movable.sed</code> file to take advantage of exploits in the System Settings application.</p>
<p>Once you have your devices encryption key (<code class="language-plaintext highlighter-rouge">movable.sed</code>), you can use it in conjunction with BannerBomb3, which uses your <code class="language-plaintext highlighter-rouge">movable.sed</code> file to take advantage of exploits in the System Settings application.</p>
<p class="notice--primary">Continue to <a href="bannerbomb3">BannerBomb3</a></p>