QUOTE(Jennekee @ Jan 2 2006, 09:42 PM)

Reason... when you softmod it wit han exploit, it re-writes a text file in the C/ partition that makes it check the E/dashboard file for either 'default.xbe' 'xboxdash.xbe' or 'msdash.xbe'. Updating with a CD just updates the MS dash in the C/ partition. But since it loads the dash from the e/ partition, it isnt gonna load it if you deleted/fucked it up.
With softmods, the original MS dash is always loaded from C:\xboxdash.xbe, which then triggers the exploit. If there's no MS dash, the softmod never even comes into play. If the MS dash is replaced, then it should still trigger the exploit and work fine (for some softmods anyway). If it also replaces the fonts, it basically disables any font exploit, and your Xbox is once again unmodded. Also, the dash can be loaded from anywhere so long as you configure it correctly, if you so wanted to you could load a dash from even the Z partition, although the probability of it still being there very long would be slim.
QUOTE(Jennekee @ Jan 2 2006, 09:42 PM)

How to softmod via ftp you ask... easy. Get the 007 Agent Under Fire game. NON PLATY HITS. Get the Linux Installer that works for VERSIONS 1.0-1.5! NOT THE ONE THAT CAN USE 1.6-1.7 AS THESE WONT SUPPORT FTP. Xbox Versions 1.0-1.7 will ass work, the file just has to be for versions 1.0-1.5. Load the exploit via the Mem Unit and STOP! Now get a modded Xbox and a X/O cable and link them. Have the modded Xbox FTP your Xbox and replace 'Xboxdash.xbe' and 'msdash.xbe' with the dashboard of your choice, but rename it 'xboxdash.xbe' and 'msdash.xbe'. Voila... Modded Xbox w/o using the exploit to install it.
Error 21. It goes a little like this: Xbox boots from TSOP using retail BIOS, which looks for C:\xboxdash.xbe. The file is not signed with MS' private key, so the kernel refuses to execute it. There's nothing else to fall back to, so the Xbox errors.
There's two main exploits used in most softmods, the initial gamesave exploit to gain FTP access or run an autoinstaller, then a second exploit to patch or overwrite the kernel in memory, which is triggered from a stock MS dash. The altered kernel (no longer restricted by the MS key) then boots whatever it is configured to, eg. E:\dashboard\default.xbe.