Discussion in 'Video Games and Technology' started by raven02ta, Jan 29, 2007.
Where would i be able to get one for the slim version of PS2 so i can play the TF game and others.
Transformers Tatakai is actually the best reason to NOT mod your system.
haha yea i hear you but i figure since there are plenty of games from japan i want to play and can get i might as well play this one since i already have it.
I think this is warranted:
I hope you know how to solder, some of those have 17 leads to do.
there are sodderless mod chips...at least for the xbox.
Last time I checked, solderless chips cost a lot more.
I really need to figure out how to mod my xbox, as it just sits there, unused, unloved.
You don't even require a modchip to mod an xbox. All you need to do is track down a copy of mech assault (not the greatest hits version), a usb extension cord, a memory card, and the appropriate files. Then all you do is load the software exploit onto your memory card through the usb cable you solder into the card, load the exploit file as a mech assault save game, and from there you've got ftp access to your xbox so you can upload whatever dashboard mods you want
OK, that does not sound easier than mod-chipping!
Sounds easy, but what about the onboard bios? How does it overcome that?
For an original Xbox, I recommend the solderless chip. On mine, there was one wire I still had to solder, but to install the actual chip all you do is screw it down.
Installing the new bios and getting the new dashboard loaded was the problematic part for me.
Mine (for the Xbox) was only $29.
Then it's gone down a LOT since I checked. It's been a couple years though.
still sounds harder than anything I am capable of.
I can't quite remember the exact specifics, but as far as I remember, the software exploits work on something automatically loaded when the xbox boots up, like certain font files, or sound files (there are a few exploits, so the exact file varies). When installing an exploit, one or more of these files are replaced with an exploit file which, when loaded by the system at startup, causes a memory overflow, and opens up a vulnerability in the system to running unoficial code.
From this point a bios loader is run (such as phoenix bios loader), and from there an unofficial bios can be loaded.
Separate names with a comma.