On Sunday, April 6, 2003, 10:09:58 AM, you wrote:

> Mark Knipfer [MK] wrote:

MK>> For instance, if RIT Labs would allow users to accept the Next Unread
MK>> key shortcut behavior where it accept 'n', no hacks would have been
MK>> suggested. Since it is possible to do, a hack or slight modification is
MK>> available. Such modifications are only done at the end user's risk.

> Yes, at the risk of using one's user license or more.

I have never heard of any software companies that penalized an end user
for modifying a program's compiled code to make it work to their own
needs. If a software company would revoke anyone's software license for
such, this would probably big make news and possibly blacklist the
software company. This would also provide the Open Source arena to
further promotions and emphasis on why proprietary software is bad.

> Where do you draw the line with these modifications?

If someone intentionally modified a compiled program's code and somehow
mass distributed it via e-mail virus or alike with the intent to cause
some form of damage or harm to its end users and to the software
vendor's reputation, then this is definitely crossing the line and would
cause the software company to pursue legal matters.

> Also, though you haven't distributed a copy of your hacked executable,
> you've provided information on how to do the hack.

I can think of several scenarios that would fit into this category.  It
is sort of like you may provide the documentation on how to do
something, but the documentation or instructions does not state to do
this or that, or implicate that you, as the end user, should do this or
that.

-- 
Using The Bat! v1.62o on Windows XP 5.1 Build  2600
Service Pack 1


________________________________________________
Current version is 1.62 | "Using TBUDL" information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to