Signing was already covered ( <a href="http://www.youdzone.com/signature.html">http://www.youdzone.com/signature.html</a> ) but it relies on mathematically derived security to work.As the original xbox and the wii (with the trucha hack) saw you need to use a good algorithm* and use it properly, such a method is known as whitelisting.*It is not just those on the side of the developers that fall foul of this: CRC32 is used by many rom managers for the