|
2009-10-26
, 14:27
|
Posts: 183 |
Thanked: 40 times |
Joined on Oct 2009
@ Germany
|
#12
|
|
2009-10-27
, 00:07
|
Posts: 470 |
Thanked: 173 times |
Joined on Oct 2009
@ Melb
|
#13
|
|
2009-10-28
, 03:25
|
Posts: 470 |
Thanked: 173 times |
Joined on Oct 2009
@ Melb
|
#14
|
|
2009-10-28
, 10:04
|
|
Posts: 296 |
Thanked: 111 times |
Joined on Oct 2009
@ Manchester
|
#15
|
|
2009-10-28
, 10:52
|
|
Posts: 2,121 |
Thanked: 1,540 times |
Joined on Mar 2008
@ Oxford, UK
|
#16
|
The Following User Says Thank You to pelago For This Useful Post: | ||
|
2009-10-30
, 01:51
|
Posts: 470 |
Thanked: 173 times |
Joined on Oct 2009
@ Melb
|
#17
|
|
2009-10-30
, 02:25
|
Posts: 39 |
Thanked: 51 times |
Joined on Oct 2009
|
#18
|
|
2009-10-30
, 03:38
|
Posts: 470 |
Thanked: 173 times |
Joined on Oct 2009
@ Melb
|
#19
|
@optimaxxx
Yes I was referring to the exploit that was patch. But some of the information on protocols from that project would be useful if you are looking at creating a remote play application.
|
2009-11-16
, 11:47
|
Posts: 470 |
Thanked: 173 times |
Joined on Oct 2009
@ Melb
|
#20
|
Tags |
ps3, remote play |
Thread Tools | |
|
This link is to the Open remote play site which has the source code for the reverse engineering of the remote play protocol. Using it requires a psp which can run homebrew. There was a linux port being created i am not sure if it was released or not.