Disclaimer
Here are just a few final thoughts to keep in mind before you get started with this book. Although you’re unlikely (at least pretty unlikely) to make your computer explode by following the directions in this book, there are a few guidelines you should keep in mind:
- You’re on your own.
If you follow the examples in this book to a T, things should work just swimmingly. However, I can’t sit beside you and guide your mouse, especially if you take what you’ve learned from the examples in this book and try to work your mojo on some other application or part of the system.
- You do these things at your own risk.
Software hacking, while fun, is like walking across the street; you need to look in both directions before crossing. Be aware and wary of what you’re doing, and keep notes about what you’ve done in case you need to later retrace your steps (or avoid a step you’ve taken that went wrong).
- We have no legal liability.
By using any of the methods in this book, you signify your assent to the following Terms and Conditions. The author and publisher of this book are not responsible for whatever you do to your system or applications and accept no liability related to the delay, failure, interruption, or corruption of any data on your computer nor for any direct, incidental, indirect, special, or consequential damage resulting from any defect in this write-up, nor for any adverse effects of time dilation and/or tachyon production caused by working through these exercises too quickly. ...