-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Mark Knipfer [MK] wrote:

>> The license states:
>> ,----
>> |Also, you may not modify, decompile, disassemble, otherwise reverse
>> |engineer, or transfer the program, or any subset of the program, except
>> |to the extent and for the express purposes authorized by applicable law.
>> |Any such unauthorised use shall result in immediate and automatic
>> |termination of this licence and may result in criminal or civil
>> |prosecution.
>> '----

>> You may not modify the program or any subset of the program except to
>> the extent and for the purpose authorized by applicable law.

MK> How I see it, if the program does not allow a certain functionality
MK> that accommodates the end user and does not harm the program code
MK> and it is not mass distributed, modifying (or apply certain program
MK> hacks) to make the certain functionality in a program is probably
MK> okay to do.

Sure agreed ... and this is why you'll likely not receive any heat from
Ritlabs. However, whichever way you take it, doing what you do with
Resource Hacker *does* amount to modifying the program.

MK> There are many hacks to many programs where the software vendors
MK> eventually add that lacking functionality to the program to avoid
MK> future hacks or slight modifications to the program code.

Yes. I grant you this as well. However, hacking of this sort should be
done with care since it technically amounts to a licensing breach. This
isn't the GNU license. :)

MK> Correct.  If you read the Microsoft Windows software license, you
MK> are using Windows at your own risk and no guarantee.

The TB! license says this as well. This has nothing to do with altering
the program. It just has to do with using the program with the
understanding that no program is bug free, no program will work in an
absolutely predicatable way on all machines and their variable
configurations. As a result errors and data loss could very well occur
and Ritlabs shouldn't be held responsible.

Most software license agreements will have this stipulated in it.

MK> So there is no difference and there are hundreds of hacks for
MK> Windows functionality.

Hacking is now a loose term and covers a lot of things one does to tweak
an application. For Windows, a lot of legitimate
workarounds and modifications are called hacks simply because they
aren't readily apparent and aren't implemented through hitting an
official configuration panel option switch.

MK> If RIT Labs is against these hacks to accommodate the end users
MK> needs in the program where these hacks work, then they should add
MK> the functionality and/or feature to the program.

Yes, and they do this sort of thing, as we speak, through feature
additions and enhancements. They may not occur at the rate and in the
way all users wish. However, this doesn't mean that unsatisfied users
now have the right to modify the program to do as they wish. If you
embark on such practices you definitely do so at your own risk.

This is why the free software foundation and Open Soure development
exists. So that users aren't bound by such licensing restrictions.

MK> These hacks only show the lack of a program's functionality and ease
MK> of use to the end users.

No program will please all end users.

MK> For instance, if RIT Labs would allow users to accept the Next Unread
MK> key shortcut behavior where it accept 'n', no hacks would have been
MK> suggested. Since it is possible to do, a hack or slight modification is
MK> available. Such modifications are only done at the end user's risk.

Yes, at the risk of using one's user license or more.

Where do you draw the line with these modifications?

Also, though you haven't distributed a copy of your hacked executable,
you've provided information on how to do the hack.

This isn't necessarily a self-righteous post on my part since I have
personally modified the PGP plug-in dll to better display the PGP version
that I was using. I however embarked on it knowing the technical
licensing breach. However, I thought it harmless to Ritlab's interests
and that they wouldn't mind. :) They apparently don't since I'm sure
they knew about it.

They may do the same in your case but we must realize the thin line we
walk when doing such things, the grey area we're now in and that we are
no longer on legally firm ground.

- --
 -= allie_M =- | List Moderator | OS: XP Pro (SP1)
_
-----BEGIN PGP SIGNATURE-----
Comment: My Public Keys - http://www.ac-martin.com/pgpkeys.html

iEYEARECAAYFAj6QNTgACgkQV8nrYCsHF+I2zACdH/slNInOo3t0I/sYg6EJTZr+
9LoAn2ZtSoCE7iyyfKDGIWLY9mgcRGEE
=xjlf
-----END PGP SIGNATURE-----


________________________________________________
Current version is 1.62 | "Using TBUDL" information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to