What the heck is all that “[h] [t] [JP] [EU] [!]” at the end of ROMS I download?
Most of these “codes” are GoodCodes, related to the series of GoodTools programs by Cowering. This language helps hackers of ROMs to specify what they did to get the ROM to work. When they dump files from games, there are alot of different circumstances that allow them to actually get the games from one system to run on another. Sometimes they write new code, new BIOS or “re-train” the game to run on a 32-bit system instead of a 8 or 16-bit system with cheats at the beginning with an in-game menu. These codes represent the circumstances or actions they performed on that file. Also Tags like [JP] (Japan) or [EU] (European) stand for the region of the world the game came from.
Sometimes you will see things like: “H@CKR K1NG”, “R0mulus15”, or “M3d1aYeS” at the end of ROMS, 90% of the time these are the signatures of the people who worked on that specific file, and tagged it that way for the credit of working on that file.
These sites may be helpful in alleviating the confusion of what each of these codes mean:
If I own and use ROM’s and Emulators am I gonna go to jail or pay some fine eventually?
Reference SS’s Legal page.
I’m looking for a specific game, but can’t find it? What do I do?
Reference SS’s Games page.
We scour the web to find and collect the best ROM and ISO sites possible, if you can’t find you’re game at the sites we reference, leave the game name and other specific info in any of our comment sections or email us at firstname.lastname@example.org and SS will track it down for you.
How are ROMs and other emulated games created?
Video game hackers start with a video game cartridge, disk or file and they use a piece of machinery, called a Linker, Compiler or Loader to export the files out of that video game’s shell and transfer the data into the hackers computer that that machinery is connected to. Most of these physical technologies look like the part of the console that you place your cartridge or disc into. The Hacker then proceeds to get the data to become compatible with an emulator on some platform of a PC using a self-written or publicly available program.
The Hacker can change the game’s color scheme, language, input controls and story presentation or separate music and video files for singular viewing in this process. He/She will control every piece of data and how the emulator interprets it onto the computer that you’ll eventually play it on. This process is where most hackers must use a combination of computer smarts, code databases and trial and error to get the synchronization of sound and video, the stretching and loading of textures in video games, and the compatibility of presenting video images (initially made to be presented through only a few types of screens) through the millions of different types of sound and graphics cards on the world’s PCs.
Once that is done, the hacker will upload the games file/s to various websites where you can get the file and play it on your computer. And They Lived Happily Ever After.
Want More Nitty Gritty Details!? Try http://www.romhacking.net/.