127w ago - As a follow-up to his previous article, today ps3mrenigma details PS3 Mount Points, FileSystems and Alejandro on his blog (linked above).
To quote, roughly translated: Following the publication in the day yesterday the source code indicating the SYSCALL used for the assembly system is no longer necessary for security, keep this information privately, and whether the information actually had not been published by my, despite claims to the contrary by many users, was to prevent misuse and attack the flash, anyway as I said in my last post we had in mind when it was polished release something new, everybody is free believe us or not, but it is.
For more information, an old post of mine: http://ps3mrenigma.wordpress.com/2010/11/10/a-quick-note-a...reversing-post/
As is the case, step assemblies are writing, how they work, and which are assembled and disassembled as explaining in turn the SYSCALL used in the process.
First of all understand that this post is a technical post, so that many users will serve you for nothing more than for your personal knowledge, which I think is worth more than any other program exists or can be made to root it.
127w ago - A few days back we reported on Mount Alejandro PS3 Dev Flash Homebrew by Spanish developers JaiCraB and ps3mrenigma, and today ps3mrenigma has explained it in further detail on his blog (linked above).
To quote, roughly translated: First of all, apologize for making this post nearly a week after the appearance of the application,
Unfortunately I have the time to update the blog as I wanted, but nevertheless, better late than never,
I want to thank all those who have had words of thanks to the program, I am pleased to see that it was well accepted.
Although I could not help but read some comments that came a few days ago and that made me laugh, lack of knowledge by giving statements without really knowing how the application.
That is why what has happened to answer some questions that might exist.
A. Do you use 'Alexander' some unknown exploit?
The answer is NO. The method that uses 'Alexander' to perform its function is very simple, there is nothing magical nor is it an exploit, as I read, still laughing a while ago of some user.
While exploits in the PS3 know, none of them is used in 'Alexander', are not necessary...