Hacking
After the demise of official support, the Audrey drew the attention of computer enthusiasts. They quickly discovered an exploit to launch a pterm session. Using privilege escalation techniques, the root password in the passwd file could be edited, opening the box to further experimentation.
Many of the tools for the QNX operating system development platform were quickly adapted for use in the Audrey, including an updated web browser (Voyager), an MP3 player, digital rotating photoframe, and other applications.
The CompactFlash slot was also investigated. Although it could not be used for storage expansion, the Audrey was set to flash its operating system from the slot. Soon, a variety of replacement OS images were distributed among enthusiasts. As the device could utilize an optional Ethernet connection, it was an easy task to mount a remote disk drive served up by a neighboring desktop system, thus allowing for virtually unlimited storage capability.
Read more about this topic: 3Com Audrey
Famous quotes containing the word hacking:
“Experimental work provides the strongest evidence for scientific realism. This is not because we test hypotheses about entities. It is because entities that in principle cannot be observed are manipulated to produce a new phenomena
[sic] and to investigate other aspects of nature.”
—Ian Hacking (b. 1936)