Interesting, but you lost me at the southern accent tangent. Some get into that kind of thing, but I prefer commentary that stays more on topic. Maybe starting off by explaining who authored the hack, when it was released, and doing a bit of research could give you some more material. If you need more subject matter, you could read through the readme and its RHDN entry, try to track down old dev threads, and maybe even send the author an email with some questions or something.