Feeds

Nintendo acts against Wii modchips?

Console internals rejigged

The Power of One Brief: Top reasons to choose HP BladeSystem

Nintendo is reportedly tweaking the Wii's internal workings to prevent the use of console modification chips.

According to Taiwanese retailers cited by local newssite DigiTimes, the latest Wiis sport a modified motherboard intended to make it harder if not impossible to add existing modchips - at least not without damaging the system.

Modchips are typically used to allow games consoles to play games copied onto DVD°R/RW media. Nintendo and other console vendors claim these are all pirate copies - many modchip users maintain they're back-ups made to prevent the original discs being damaged.

Maybe, but not every country permits such back-ups to be made, and Nintendo's software licence terms forbid it, so quite a few modchip users are on shaky ground even if they're using copies of discs they've purchased and still own.

Either way, expect modchip makers to explore new ways of fitting their products to the Wii, and likewise for Nintendo to seek methods of thwarting them.

Using blade systems to cut costs and sharpen efficiencies

More from The Register

next story
Report: American tech firms charge Britons a thumping nationality tax
Without representation, too. Time for a Boston (Lincs) Macbook Party?
iPad? More like iFAD: We reveal why Apple ran off to IBM
But never fear fanbois, you're still lapping up iPhones, Macs
Apple gets patent for WRIST-PUTER: iTime for a smartwatch
It does everything a smartwatch should do ... but Apple owns it
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.