Quote:
Originally Posted by quicksilver
How about the iLiad? It seems that you have one. Isn't that the de facto device to hack with?
|
There are certainly more 3rd party apps ported to the iLiad than any other device. It can also be setup with a SSH deamon. The way that the iLiad's standard interface interacts with the filesystem is unique, but could be used to advantage if you don't mind being iLiad-specific.