Deploying to gh-pages from @ hacks-guide/Guide_Wii@c47b0e4b6d 🚀
This commit is contained in:
parent
f954e6a45a
commit
b4dbc4d4a0
2 changed files with 2 additions and 2 deletions
2
feed.xml
2
feed.xml
|
@ -1 +1 @@
|
|||
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.3.2">Jekyll</generator><link href="https://wii.hacks.guide/feed.xml" rel="self" type="application/atom+xml" /><link href="https://wii.hacks.guide/" rel="alternate" type="text/html" /><updated>2023-10-27T14:11:36+00:00</updated><id>https://wii.hacks.guide/feed.xml</id><title type="html">Wii Hacks Guide</title><subtitle>The complete guide to modding your Wii (and Wii mini)</subtitle><author><name>Nintendo Homebrew</name></author></feed>
|
||||
<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.3.2">Jekyll</generator><link href="https://wii.hacks.guide/feed.xml" rel="self" type="application/atom+xml" /><link href="https://wii.hacks.guide/" rel="alternate" type="text/html" /><updated>2023-10-27T14:30:16+00:00</updated><id>https://wii.hacks.guide/feed.xml</id><title type="html">Wii Hacks Guide</title><subtitle>The complete guide to modding your Wii (and Wii mini)</subtitle><author><name>Nintendo Homebrew</name></author></feed>
|
|
@ -430,7 +430,7 @@ Alternatively, you can launch the SysCheck Updater Wizard (<code class="language
|
|||
It will allow you to launch an exploit to boot an from emulated NAND from external storage, rather than use your Wii’s internal NAND.</p>
|
||||
|
||||
<p>You can also make a NAND backup without modifying your Wii at all by navigating to ModMii’s “Support” folder and launching <code class="language-plaintext highlighter-rouge">Casper2BootMii.bat</code>. <br />
|
||||
It will save some files to a folder named <code class="language-plaintext highlighter-rouge">COPY_TO_SD</code>; copy the files inside it to your SD card and <a href="get-started">launch an exploit</a>.</p>
|
||||
It will save some files to a folder named <code class="language-plaintext highlighter-rouge">COPY_TO_SD</code>; copy the files inside it to your SD card and launch an exploit like <a href="wilbrand">Wilbrand</a>.</p>
|
||||
|
||||
<p class="notice--warning">When following one of the exploit guides above, avoid replacing the <code class="language-plaintext highlighter-rouge">boot.elf</code> file.</p>
|
||||
|
||||
|
|
Loading…
Reference in a new issue