#170503 - the-anonymous-coward - Tue Sep 29, 2009 8:43 pm
Hi. I was reading through the tepples topic and was intrigued by a post stating the the ds dev community would pick up if the dsi was hacked.
(Irrelevant Note: It would be nice if it did; I am not a regular and know little of this stuff; this is a hobby and I don't have much spare time, but I love that the resources are hear when I need them; as a kid playing my gamboy, from Link's Awakening (I was obsessed with this game for ages) to the final fantasy remakes for the DS, I always fantasized about writing something for one of nintendos handhelds; there is something that feels like magic about making a game (until you are ready to explode from learning all the complicated C++ stuff and then, when you are finally starting to get it, you find you don't really know how to organize your classes or separate them into many files and what not in the most effective manner, etc)).
(Irrelevant Observation: with the way I write "notes" maybe lisp is the language for me :-) )
Anyhoo, I've never really thought about it much, but how is a new system hacked? What are the processes? I assume reverse engineering is the key term here, but know nothing about it? Just curious.
(Irrelevant Note: It would be nice if it did; I am not a regular and know little of this stuff; this is a hobby and I don't have much spare time, but I love that the resources are hear when I need them; as a kid playing my gamboy, from Link's Awakening (I was obsessed with this game for ages) to the final fantasy remakes for the DS, I always fantasized about writing something for one of nintendos handhelds; there is something that feels like magic about making a game (until you are ready to explode from learning all the complicated C++ stuff and then, when you are finally starting to get it, you find you don't really know how to organize your classes or separate them into many files and what not in the most effective manner, etc)).
(Irrelevant Observation: with the way I write "notes" maybe lisp is the language for me :-) )
Anyhoo, I've never really thought about it much, but how is a new system hacked? What are the processes? I assume reverse engineering is the key term here, but know nothing about it? Just curious.