01-15-2009, 04:01 PM
|
|
Lurker
Offline
|
|
Join Date: Oct 2008
Posts: 24
Reputation: 10
Mentioned: 0 Post(s)
Tagged: 0 Thread(s)
|
|
Re: Replacement for Juicy
Quote:
Originally Posted by Juggalo_X
the splash identifies the name of the device usual what it does. the name of the rom is Juggalo. the splash states that. and sorry juickys rom is branded Microsoft even says so on the splash screen. better call up Mr.Gates and tell him you dont liek his ego tag lol your to funny. your explinations dont make sence. i fire up my samsung TV and it says the companies name there lol. you cant chritisise other cooks for putting there name in there creation. especially if your going to be hippochritical and not chritisise Microsoft for branding thre developments. and as for the pirated software, you dont even knopw how that scene works have you ever made a crack your self or decompiled one. they hex brand all there work and yes some even do change the program splashes. again im going to say ur argument is poor. especially when you singled MightyMike out because he chose to have Mighty Mouse as his boot screen and chritisied how that would reflect on the person using his rom in ap rofessional manner. it shouldnt make a difference if your business asociates are solid and your friends are your friends.
|
OK, this will be my last post regarding this subject as we have different opinions and will just have to agree to disagree...
When it comes to Microsoft branding their software, how can that not be acceptable? After all, they created the software. Tens of thousands of man hours went into the development of the software used on the phone. Did you write Windows Mobile? Most of what’s done here is deleting, replace and modifying parts of the existing OS. If you physically replaced the OS with your own creation, I would have no room to comment and this argument would be moot.
While I have never physically hacked/cracked and application, I do know what’s involved. First off, you can never decompile an application back to its original state. Once the application has been compiled into system code (ASM), it can only be decompiled so far. Furthermore, there are many ways of hacking an application. If you have enough understanding of the algorithm used to create a product key, you can physically reverse engineer the code used to activate or register the product. An easier and more common method of hacking is by using jump points and/or memory injection methods to bypass the activation routine or module all together.
While I respect the individual’s ability to hack the program, I still find it distasteful to include a visual splash screen or modify the program to give credit to the individual responsible for hacking it. Furthermore, I find it more distasteful for the groups responsible for distribution to include their own .nfo files within the project having really done nothing but downloading it from a FTP, Torrent or WEB site.
Don’t get me wrong, I’m very grateful for this community and the people in it. Without it, I would be forced to learn how to cook my own .roms, for which I do not have enough time to learn. I’m using Juicy_4.4 at the moment. I was merely expressing my opinion of the Juicy .roms and others while hoping someone might see my point of view.
Last edited by OregonLAN; 01-15-2009 at 04:04 PM.
|