Feeds

How to hack a Sony Reader

Inside the Linux-based e-book viewer

Internet Security Threat Report 2014

Amazon’s Kindle receives plenty of publicity, but it’s only available in the US. Book buffs elsewhere have to content themselves with other e-book readers, of which one of the most popular is the Sony Reader. The PRS-505 is available from High Street stores like John Lewis and Waterstones, making it one of the more visible devices at the moment.

Sony_reader_red

Sony's PRS-505: eminently hackable, thanks to its Linux foundations

It’s also comparatively easy to tweak and hack, thanks to the way it’s designed. The core operating system is MontaVista Linux, and though the speed of response of the e-ink screen and the lack of a full keyboard means that you can’t really use it as a general purpose computer, there is a fair bit that you can do with it.

Some is simple customisation: you can change the fonts, icons and logos, or add your name and contact details to the About screen, for example. Buttons can be reassigned, or disabled too, so if you prefer to shut the Reader down rather then send it to sleep, then you can add that function to an easily accessible key, instead of having to work through a few menus to find it.

It’s actually possible to go a lot further than that. The reader is controlled using JavaScript and XML, and there are even applications such as dictionaries and Sudoku that can be run from an SD card.

When a memory card is inserted in the reader, it’s scanned by the operating system. As well as looking for books, the folder /Sony Reader/software is checked for an autorun.xml file.

Sony PRS-505 Reader electronic book

Activated with XML and JavaScript

This file defines functions for things like button presses and controls the skin elements that will appear on the display, all through JavaScript. It can also launch applications. According to the service manual, it can be used to load a diagnostic test too – and it’s by using this mechanism that you can start to customise your reader.

Providing a secure and efficient Helpdesk

More from The Register

next story
Will.i.am gets CUFFED as he announces his new wristjob, the PULS
It's got four KILOWATTS of something, apparently
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
Jaguar Sportbrake: The chicken tikka masala of van-sized posh cars
Indian-owned Jag's latest offering curries favour with us
iPhone 6 shunned by fanbois in Apple's GREAT FAIL of CHINA
Just 100 Beijing fanbois queue to pick up new mobe
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Here's your chance to buy an ancient, working APPLE ONE
Warning: Likely to cost a lot even for a Mac
Is living with Dolby Atmos worth the faff?
Subtle, naturalistic ambiance – perfect for Transformers 4
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.