13.03.2013 Views

Hacking the Xbox

Hacking the Xbox

Hacking the Xbox

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

156<br />

<strong>Hacking</strong> <strong>the</strong> <strong>Xbox</strong>: An Introduction to Reverse Engineering<br />

Figure 10-2: The unpopulated memory footprints on <strong>the</strong> <strong>Xbox</strong> mo<strong>the</strong>rboard.<br />

Fiduciaries<br />

Look at an unpopulated memory spot on <strong>the</strong> <strong>Xbox</strong><br />

mo<strong>the</strong>rboard. The silver dot surrounded by a dark annulus<br />

inside <strong>the</strong>se unpopulated chip footprints is called a fiduciary.<br />

Fiduciary patterns are used by circuit board assembly<br />

machines as reference points for aligning large chips<br />

with many pins. They are designed to be easily recognized<br />

by <strong>the</strong> machine vision systems employed in board assembly<br />

machines. Specially shaped fiduciaries can also be used<br />

to enable automatic identification of <strong>the</strong> orientation and<br />

type of a circuit board.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!