On Apr 4, 2010, at 2:07 PM, James Hess wrote: > On Sun, Apr 4, 2010 at 2:33 PM, Michael Sokolov > <[email protected]> wrote: >> feature blocking seems to negate that. I mean, how could their >> disabled-until-you-pay blocking of "premium features" be effective if a >> user can get to the underlying Unix OS, shell, file system, processes, > > Probably signed binaries, veriexec with a signature list of allowed > executables, proprietary system daemons, hardware drivers, and > read-only filesystems. Protections may be in hardware, and you do not > have source code. You can in JunOS "start shell user root" as > much as you like and get a root shell on various platforms, but some > functions are limited. > Most of their license keys are implemented as nag-ware. If you don't mind logs full of "Use of this feature requires a license..." messages, then, it's between you and your lawyers as long as you don't get caught.
Owen

