Deploying to gh-pages from @ hacks-guide/Guide_Wii@c47b0e4b6d 🚀

This commit is contained in:
Naim2000 2023-10-27 14:30:19 +00:00
parent f954e6a45a
commit b4dbc4d4a0
2 changed files with 2 additions and 2 deletions

View file

@ -1 +1 @@
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.3.2">Jekyll</generator><link href="https://wii.hacks.guide/feed.xml" rel="self" type="application/atom+xml" /><link href="https://wii.hacks.guide/" rel="alternate" type="text/html" /><updated>2023-10-27T14:11:36+00:00</updated><id>https://wii.hacks.guide/feed.xml</id><title type="html">Wii Hacks Guide</title><subtitle>The complete guide to modding your Wii (and Wii mini)</subtitle><author><name>Nintendo Homebrew</name></author></feed>
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.3.2">Jekyll</generator><link href="https://wii.hacks.guide/feed.xml" rel="self" type="application/atom+xml" /><link href="https://wii.hacks.guide/" rel="alternate" type="text/html" /><updated>2023-10-27T14:30:16+00:00</updated><id>https://wii.hacks.guide/feed.xml</id><title type="html">Wii Hacks Guide</title><subtitle>The complete guide to modding your Wii (and Wii mini)</subtitle><author><name>Nintendo Homebrew</name></author></feed>

View file

@ -430,7 +430,7 @@ Alternatively, you can launch the SysCheck Updater Wizard (<code class="language
It will allow you to launch an exploit to boot an from emulated NAND from external storage, rather than use your Wiis internal NAND.</p>
<p>You can also make a NAND backup without modifying your Wii at all by navigating to ModMiis “Support” folder and launching <code class="language-plaintext highlighter-rouge">Casper2BootMii.bat</code>. <br />
It will save some files to a folder named <code class="language-plaintext highlighter-rouge">COPY_TO_SD</code>; copy the files inside it to your SD card and <a href="get-started">launch an exploit</a>.</p>
It will save some files to a folder named <code class="language-plaintext highlighter-rouge">COPY_TO_SD</code>; copy the files inside it to your SD card and launch an exploit like <a href="wilbrand">Wilbrand</a>.</p>
<p class="notice--warning">When following one of the exploit guides above, avoid replacing the <code class="language-plaintext highlighter-rouge">boot.elf</code> file.</p>