ROM hack: Difference between revisions

3 bytes removed ,  26 February 2016
m
Line 17: Line 17:


==Legality==
==Legality==
As suggested by it’s name, read-only memory is designed only to be read and not modified in any way. Most published games belong to their respective publishers, hence the read-only memory portion of these games are subject to intellectual property and copyright laws. It is illegal in most countries to make copies of or redistribute any of the game’s code. As a result, it is illegal to distribute copyrighted ROM files in any way, including over the Internet. Doing so may result in prosecution on the grounds of copyright law.
As suggested by its name, read-only memory is designed only to be read and not modified in any way. Most published games belong to their respective publishers, hence the read-only memory portion of these games are subject to intellectual property and copyright laws. It is illegal in most countries to make copies of or redistribute any of the game’s code. As a result, it is illegal to distribute copyrighted ROM files in any way, including over the Internet. Doing so may result in prosecution on the grounds of copyright law.


This issue is dealt with by hackers distributing what are known as patch files. Essentially, these are small sets of computer instructions on how to modify a ROM file in a particular way, which produces the hacked game. Patch files, often distributed in the IPS or UPS format, are not illegal and can be distributed freely. However, one would need to obtain the required ROM file and patching software in order to apply the patch.
This issue is dealt with by hackers distributing what are known as patch files. Essentially, these are small sets of computer instructions on how to modify a ROM file in a particular way, which produces the hacked game. Patch files, often distributed in the IPS or UPS format, are not illegal and can be distributed freely. However, one would need to obtain the required ROM file and patching software in order to apply the patch.