Here's my suggestion for removing most of the danger from installing the [SHELL] hack.
The "a" script.
Code:
#!/bin/sh
/bin/sed -i -f /mnt/free/shellme.sed /mnt/settings/er_registry.txt
The /mnt/free/shellme.sed script
Code:
/^uaIDList=/ {
/;EBA$/ {
s/;EBA$/;EBA;SHELL/
a\
[SHELL]\
category=viewer\
arguments=<FILENAME>\
exec=/bin/sh\
xResourceName=sh\
channel=14\
extensions=sh;SH
}
}
This is a very paranoid sed script. You can run it twice, thrice but it will only apply the patch once. If you've mucked too badly about with your er_registry.txt file's uaIDList= line it won't make the patch.
To use it you would copy both files to the root of your iLiad's USB drive from your PC/MAC/LINUX computer.
You would then do the Arivero exploit and enter: `/mnt/free/a` for the key.
The a script (which is execute allowed by default on MSDOS filesystems) will run /bin/sed to edit in-place your /mnt/settings/er_registry.txt.
The shellme.sed script limits itself to a line that begins with "uaIDList=" of which there is only one. To be extra paranoid it then further limits itself to operating on only such a line that ends with ";EBA". This combination makes a pretty hard lock on only a factory original "uaIDList=" line.
Once that single line has been isolated it appends ";SHELL" to the end of that line. It then appends the [SHELL] definition block after that line.
Once this has been done a reboot of your iLiad will result in your ContentLister being able to execute .sh files by clicking on them.
The suggested test would be to play a game of chess.
Thoughts?