翻訳と辞書
Words near each other
・ Wik-Ngatharr dialect
・ Wikana
・ Wikaryjskie
・ WIKB
・ WIKB-FM
・ Wikborg rein
・ Wikcinek
・ WIKD
・ WIKD-LP
・ WIKE
・ Wike
・ Wike executive council of Rivers State
・ Wike's law of low odd primes
・ Wikel, West Virginia
・ Wii Freeloader
Wii homebrew
・ Wii ISO Archive
・ Wii launch
・ Wii Menu
・ Wii MotionPlus
・ Wii Music
・ Wii no Ma
・ Wii Opera SDK
・ Wii Party
・ Wii Party U
・ Wii Play
・ Wii Remote
・ Wii sales
・ Wii Shop Channel
・ Wii Speak


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Wii homebrew : ウィキペディア英語版
Wii homebrew

Wii homebrew refers to the use of Nintendo's Wii game console to run homebrew software that has not been authorized by Nintendo. It achieves this by defeating the Wii's copy protection and code signing measures. In more general terms, Wii Homebrew refers to the use of the Wii's hardware, accessories and software for purposes outside those intended by the manufacturer.
Original efforts focused on using the Wii Remote as a pointing device on other operating systems, and running web-based games in the built-in web browser. Subsequent development in game exploits, such as the "Twilight hack",
"Smash Stack", "Indiana Pwns", "Yu-Gi-OWNED", "bathaxx", and "Return of the Jodi", made installing the "Homebrew Channel" possible. There were also some exploits that did not require a game, namely "Bannerbomb" and its later incarnation "LetterBomb".
==Software==
The architecture of the Wii is based on the Nintendo GameCube hardware.〔Wii〕 Because of this, most of the homebrew development tools used for the Nintendo GameCube can be used for Wii development. The Wii contains a GameCube compatibility mode, so most GameCube homebrew will run unmodified, albeit at a slower clock rate than Wii applications. In addition, code running in GameCube mode cannot access hardware unique to the Wii, such as the Wii Remote and the Wii's USB ports. A homebrew application, the Homebrew Channel, is used to execute unofficial code that has not been approved by Nintendo, such as applications, games, emulators, media players, etc.〔(【引用サイトリンク】url=http://hbc.hackmii.com/ )
The first example of homebrew code being run in native Wii mode was demonstrated in December 2007 at the 24th Annual Chaos Communication Congress (24C3). It showed code running and responding to the Wii Remote.〔(【引用サイトリンク】title=Nintendo Wii Hacked, The Video )〕 Later, the release of the Twilight Hack exploit made it possible to run unsigned code without any hardware modifications. This hack was created by Team Twiizers and is the first release of a Wii exploit enabling homebrew software without using a modchip. It required the video game The Legend of Zelda: Twilight Princess. However, System Menu 3.3 blocked the alpha version of the hack. Team Twiizers released a beta version which contained a workaround. This led Nintendo to implement another block in System Menu 3.4. Team Twiizers yet again released another beta version of the Twilight Hack. It has been officially announced that the Twilight Hack is unusable on System Menu 4.0 and above.
Various other methods of running and installing homebrew software on the Wii have since appeared, all of which work with System Menu versions 4.2–4.3. Notably, the Bannerbomb method depends on a vulnerability in the System Menu itself. The first version of it was in the Channels section in the SD card management screen, where it takes the form of a channel. When the menu is accessed, the image ("banner") on the file corrupts and crashes the Wii, letting the boot.dol/elf literally "take over the Wii." The vulnerability was patched in System Menu 4.2, but HackMii has since released another version exploiting a vulnerability in the SD card menu.〔 Finally, with the patch introduced in the 4.3 update, Bannerbomb was declared unusable. Instead, Team Twiizers released another exploit, LetterBomb, which works similar to BannerBomb, but uses an exploit in the Wii Message Board to crash the Wii.〔http://hackmii.com/2011/08/letterbomb/〕 Indiana Pwns works in a manner similar to the Twilight Hack, but only for Lego Indiana Jones: The Original Adventures. Smash Stack is based on a vulnerability in Super Smash Bros. Brawl by executing a custom stage file consisting of the installer directly off the SD card. This vulnerability is considerably more difficult for Nintendo to patch, as it exists in the game itself and not in the system. However, one must delete all custom stages one has on the Wii's save data or the SD card. It was released by comex for NTSC-U and ported to NTSC-J, PAL and KOR by others.〔(【引用サイトリンク】title=Smash Stack )〕 Another exploit, Return of the Jodi, works on LEGO Star Wars: The Complete Saga.〔(【引用サイトリンク】title=Return of the Jodi )
The Wii Optical Drive is very similar to that of the Nintendo GameCube, which has similar flaws and backdoors. On the GameCube, this was a popular method for running homebrew software. Efforts have generally been successful in using the optical drive on most Wii systems to read standard DVDs. However, the optical drive included with black Wiis and newer white Wiis is the D3-2 optical drive, which is only capable of reading original Wii and GameCube discs.〔http://www.matthewmcdonald.com/12/hacking-the-nintendo-wii-with-the-d3-2-drive〕 This can be fixed by swapping drives with an older Wii.
Team Twiizers has released a library (DVDX) that allows other software to be able to play or read DVDs on the Wii. The hack comes in the form of a (DOL file ) that can be loaded onto a SD card as an application and executed through methods such as LoadMii, Priiloader, Twilight Hack and the Homebrew Channel. It installs a small, invisible channel on the Wii that allows DVD playback. It has currently been patched.
Several media players also exist for the Wii, including WiiMC (uses the open source media player MPlayer), which is capable of playing DVDs and media files located on SD cards, FTP servers, SMB mounts, and attached USB storage devices.
Team Twiizers also released BootMii which provides low-level control of the Wii during its boot process. It can either be installed as an IOS, or as a replacement for the boot2 boot loader, which is the third and final process of boot to load the System Menu; this only works on certain older Wii systems, as Nintendo fixed the hole in their newer Wiis. BootMii can create and restore backups of the Wii's NAND flash memory from a Secure Digital Card. If it is installed as a replacement boot loader, it is capable of restoring a backup before the Wii System Menu loads; this is especially useful in the case of a brick condition, in which the operating system cannot load due to errors or system file corruption. The Homebrew Channel, which was also developed by Team Twiizers, can also be loaded to the Wii through an SD card or USB stick. Once the Homebrew channel is loaded, the homebrew channel can be used to boot homebrew content that has been downloaded to an SD card or USB stick.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Wii homebrew」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.