On Sunday, April 6, 2003, 9:35:41 AM, you wrote:
> Thomas Fernandez [TF] wrote:

TF>> Apart from that, I am not sure that the TB licence allows "hacking"
TF>> in the source code this way. But I am by no legal expert.

> The license states:
> ,----
> |Also, you may not modify, decompile, disassemble, otherwise reverse
> |engineer, or transfer the program, or any subset of the program, except
> |to the extent and for the express purposes authorized by applicable law.
> |Any such unauthorised use shall result in immediate and automatic
> |termination of this licence and may result in criminal or civil
> |prosecution.
> '----

> You may not modify the program or any subset of the program except to
> the extent and for the purpose authorized by applicable law.

How I see it, if the program does not allow a certain functionality that
accommodates the end user and does not harm the program code and it is
not mass distributed, modifying (or apply certain program hacks) to make
the certain functionality in a program is probably okay to do. There are
many hacks to many programs where the software vendors eventually add
that lacking functionality to the program to avoid future hacks or
slight modifications to the program code.

> I don't think this resource hack falls under such an exception. :/

> ,----
> |Any such unauthorised use shall result in immediate and automatic
> |termination of this licence and may result in criminal or civil
> |prosecution.
> '----

> So, it would appear that you do this sort of thing at your own risk.

Correct.  If you read the Microsoft Windows software license, you are
using Windows at your own risk and no guarantee.  So there is no
difference and there are hundreds of hacks for Windows functionality.

> It's therefore really up to Ritlabs to decide whether this sort of hack
> is not in their interest and if they should do something about it.

If RIT Labs is against these hacks to accommodate the end users needs in
the program where these hacks work, then they should add the
functionality and/or feature to the program. These hacks only show the
lack of a program's functionality and ease of use to the end users.

For instance, if RIT Labs would allow users to accept the Next Unread
key shortcut behavior where it accept 'n', no hacks would have been
suggested. Since it is possible to do, a hack or slight modification is
available. Such modifications are only done at the end user's risk.

-- 
Using The Bat! v1.62o on Windows XP 5.1 Build  2600
Service Pack 1


________________________________________________
Current version is 1.62 | "Using TBUDL" information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to