Quote:
Originally Posted by knc1
How about making that name an active mount point?
Let us see how long it takes them to discover an in-use (active) mount point with that name and deal with it.
|
If I'm not wrong, though, you can't do that from Windows.
You have to do that either when you've ssh'ed into Kindle via USBNetwork or via Kterm, while the with "classic" method the average user could simply create it when connected in usb-storage mode.
So this 'improvement' by lab126 takes away the real added value of this method: simplicity.
If I am right, average users should find at that point more convenient to use the backdoorlock hack.
Of course your suggestion still makes sense for academic purposes, and just-in-case lab126 renders the bdl hack useless too.