On Sunday, April 6, 2003, 9:35:41 AM, you wrote: > Thomas Fernandez [TF] wrote:
TF>> Apart from that, I am not sure that the TB licence allows "hacking" TF>> in the source code this way. But I am by no legal expert. > The license states: > ,---- > |Also, you may not modify, decompile, disassemble, otherwise reverse > |engineer, or transfer the program, or any subset of the program, except > |to the extent and for the express purposes authorized by applicable law. > |Any such unauthorised use shall result in immediate and automatic > |termination of this licence and may result in criminal or civil > |prosecution. > '---- > You may not modify the program or any subset of the program except to > the extent and for the purpose authorized by applicable law. How I see it, if the program does not allow a certain functionality that accommodates the end user and does not harm the program code and it is not mass distributed, modifying (or apply certain program hacks) to make the certain functionality in a program is probably okay to do. There are many hacks to many programs where the software vendors eventually add that lacking functionality to the program to avoid future hacks or slight modifications to the program code. > I don't think this resource hack falls under such an exception. :/ > ,---- > |Any such unauthorised use shall result in immediate and automatic > |termination of this licence and may result in criminal or civil > |prosecution. > '---- > So, it would appear that you do this sort of thing at your own risk. Correct. If you read the Microsoft Windows software license, you are using Windows at your own risk and no guarantee. So there is no difference and there are hundreds of hacks for Windows functionality. > It's therefore really up to Ritlabs to decide whether this sort of hack > is not in their interest and if they should do something about it. If RIT Labs is against these hacks to accommodate the end users needs in the program where these hacks work, then they should add the functionality and/or feature to the program. These hacks only show the lack of a program's functionality and ease of use to the end users. For instance, if RIT Labs would allow users to accept the Next Unread key shortcut behavior where it accept 'n', no hacks would have been suggested. Since it is possible to do, a hack or slight modification is available. Such modifications are only done at the end user's risk. -- Using The Bat! v1.62o on Windows XP 5.1 Build 2600 Service Pack 1 ________________________________________________ Current version is 1.62 | "Using TBUDL" information: http://www.silverstones.com/thebat/TBUDLInfo.html

