Originally Posted by quicksilver
How about the iLiad? It seems that you have one. Isn't that the de facto device to hack with?
There are certainly more 3rd party apps ported to the iLiad than any other device. It can also be setup with a SSH deamon. The way that the iLiad's standard interface interacts with the filesystem is unique, but could be used to advantage if you don't mind being iLiad-specific.