I avoid talking to their forum (for obvious reasons, I don't like their sometimes rude voice and I don't like being "accused" of things), so I quote employee Jan here again:
Quote:
Reading files with standard Linux tools will not harm the iLiad.
|
What are standard Linux tools? Tools like SSH?
Quote:
If you create "content" yourselves in order to hack the iLiad you are basicly not using the iLiad for the purpose it is designed for. In a normal user behavior this situation will not happen. That is why the service desk responded as they did.
|
Can anyone explain me "normal user behavior" and how using a built-in feature can be considered hacking?
Quote:
I can understand you want your iLiad repaired, but than face the consequences of your actions without pretending you "did not do anything abnormal" and sharing your frustration in many forums since we react as you could have expected.
|
Yes, dear customer, face the consequences and get rude remarks for your criminal actions.
Quote:
We will prepare a fix to the ContentLister to prevent these kind of "accidents" and will release this in the coming days for users to download.
|
Ahh, and suddenly here he talks about a software fix.