(last updated: 22-Sep-2014)
Includes keyboard (s/n P7014112), stylus, original User's Guide, and a 3C19250 USB-to-ethernet adapter (s/n 0100/7B6F1333353)
29-Sep-2008
The package arrived today, with everything very well packed, safe and secure. I won this in an eBay auction on September 21, from seller "silversells_md". I'm very satisfied.
The package includes: Audrey, stylus, keyboard, AC power adapter, USB-to-ethernet adapter, and User's Guide. A complete kit.
The seller's auction description indicates that this unit is 'stock' except that it has been hacked just to add root shell access and an MP3 player.
29-Sep-2008
The machine and accessories were easily cleaned up with a little wet-wipe and towel-off action, and it looks perfectly mint!
29-Sep-2008
Since I had some experience with my first Audrey already, it was a breeze to setup and configure for my situation. First, I set brought up the Action Palatte to configure for my local area network, giving Audrey an IP address of 192.168.1.163. I filled in the details for everything else. For some reason I was not successful using DHCP (mirroring my experience with my first Audrey). Doesn't matter since a static address is easy to set.
This Audrey is indeed 'stock'. As far as I can tell she is operating just as if I had pulled it out of the box new. So far, I am unable to access the reputed root shell or MP3 player, though I did see that the Action Palette has an MP3 icon.
There is no Credit Card icon, and I believe this MP3 icon has replaced it since there is limited real estate in the Action Palatte window. Still, if I click on the MP3 icon, nothing happens. I've sent a query to the seller about how to access the shell and MP3 player, hoping for an answer to these two mysteries.
In all other respects, the system behaves perfectly.
15-Oct-2008
(The date of this post is approximate; this system has been powered up and used a mulitude of times between acquisition and the date of the next section.)
It wasn't hard to discover that the root shell was activated using a simple proceedure. Just press the 'Audrey Options' button, then tap the printer icon. That icon is linked to the launching of the shell, as part of the slight amount of hacking done to this machine.
Also, once at the shell, executing phjuke launches the MP3 player. Simple.
09-Sep-2014
Recent searches on the web have turned up information on hacking this system, and now that I have much more experience with UNIX-like systems, when I saw a posting about a very simple way to backup the system image, I just had to try it out. In fact, it is as simple as mounting a windows share, and dumping the images with these commands:
(get to the shell window) # fs-cifs -a //focalor:192.168.1.15:/electronics /mnt dummyuser dummypass # cat /dev/fs0p0 /dev/fs0p1 > /mnt/audrey_#2_dev_fs0p0_dev_fs0p1.dsk # cat /dev/fs0p2 > /mnt/audrey_#2_dev/fs0p2.dsk
The first image contains the two filesystems with the OS, window manager, etc., etc. on it.
The second image contains the initial program load (IPL) boot loader. Normally, this should never be restored in normal imaging operations. First, this data never changes, and, second, if the restoration is interrupted for some reason and the image is corrupted on the system, it will not boot again. At all. So, I have made a copy for the sake of the archive, but never expect to use it.
Copyright © 2006-2025 Jared Blaser. All rights reserved.