I tried making a personal CIA of the "Mario & Luigi Dream Team" update and it failed to install in PBT. Even after re-linking to my eShop EmuNAND. I get an error every time. So, maybe it doesn't work for updates or something.
Yes. Or if you don't have a spare sd card, use the emunand tool to back it up, then a partition manager to delete the "unallocated space" partition.
Why over-complicate things? All you have to do is open the SD card in ANY decent hex editor as a "physical disk". Where it says "GATEWAYNAND" simply change the "G" to something else and save it. Now the launcher can't find EmuNAND. To re-enable EmuNAND, put the "G" back. Much easier.
I have the Sky3DS and Gateway of course, so, I can load Ninjhax directly as well (now that we have FBI). I still use the one byte trick half the time though.
If you've got no flash cart, you can use PBT as well. Then dump the NAND, inject to rxTools EmuNAND, update EmuNAND (since 5 of them won't play on 4.5). You can then get updates for them from the eShop as well.
Looks like rxTools 2.4 is out also, so, I guess you could do that in reverse as well. Start by getting the updates in EmuNAND, dump the ticket.db and inject it to SysNAND, install the games using PBT, then update SysNAND to 9.2 using a game or the Sky3DS (if you have that, you might as well use Ninjhax instead of PBT though). Or if you've got Gateway, ticket inject and proceed to install the games via the one byte trick. I would not recommend trying to update SysNAND using Ninjhax and FBI atm, unless you have a hard mod (in which case, please test it).
If you don't want them showing on SysNAND, or want to region change EmuNAND because Europe has more legit CIAs, use Palantine CFW instead, and make sure you unlink from it. 3ds-triplenand makes extracting a RedNAND then copying it back as EmuNAND relatively easy.
Since I think I'm the first to mention that, to avoid multiple questions later:
Code:
1. Inject a 4.5 NAND dump as RedNAND ("3ds-triplenand -1 -cfw NAND.BIN").
2. Install EUR 4.5.0-10 system CIAs obtained from 3DNUS in Palantine.
3. Extract RedNAND and inject back as EmuNAND ("3ds-triplenand -1 -o EmuNAND.bin" then "3ds-triplenand -1 -i EmuNAND.bin").
4. Run cearp's SecureInfo tool (this uses Launcher.dat, so, rename your existing one temporarily) and inject to EmuNAND.
5. Extract EmuNAND and inject back as RedNAND ("3ds-triplenand -1 -o EmuNAND.bin" then "3ds-triplenand -1 -cfw EmuNAND.bin").
6. Rename the "Nintendo 3DS" folder.
7. Format system memory from within Palantine (this will kill your MSET exploit, twice actually).
8. Delete the new "Nintendo 3DS" folder and rename the old one back.
9. Install the legit CIAs in Palantine.
10. Extract RedNAND and inject as EmuNAND (as above).
11. Boot rxTools into rx mode and update.
12. ??????
13. Profit
Skip steps 2-8 if you're not region changing.
Note: if you use a public SecureInfo_A, don't expect to be able to access the eShop. It probably won't work. You can skip several steps if you have a Gateway (but Gateway's EmuNAND is region-patched, so there's not much of a reason to do this if you have one).
I'd say that just about covers every way to use the global legit CIAs.