The devices in question are (at least): http://www.telewell.fi/english/TW-EA501_english.pdf http://www.telewell.fi/english/TW-EA510_english.pdf http://www.telewell.fi/english/TW-646_english.pdf http://60.248.77.180/_Internet/datasheet/bipac7202g.pdf http://60.248.77.180/_Internet/datasheet/BiPAC7300_7300G.pdf http://60.248.77.180/_Internet/datasheet/BiGuard2.pdf http://60.248.77.180/_Internet/datasheet/BiGuard10.pdf http://60.248.77.180/_Internet/datasheet/BiGuard30.pdf Firmware updates are available from: http://www.telewell.fi/english/upgrade.htm http://www.telewell.fi/paivitykset/paivitykset.htm http://www.billion.com/support/download/fd/fd2.htm#fd207 http://www.billion.com/support/download/fd/fd2.htm#fd2010 http://www.billion.com/support/download/fd/fd11.htm twuclextract.c - Extract the boot image (uclinux kernel) from the Billion/Telewell ADSL firmware update (.afw). twcramfsextract.c - Extract the cramfs filesystem from the Billion/ Telewell ADSL firmware update (.afw). scangzip.c - Scan for and extract gzip files from stdin to stdout. cramfs-1.1-modified.tar.gz - Modified debian cramfsprogs package source to allow extracting (most of) the files from the Billion/Telewell cramfs filesystem. There probably are some better tools for this, but I didn't bother looking into uclinux that deeply, yet. cramfsprogs is GPL and includes full source code. This new version works properly under little endian byteorder systems (for example x86). gpl_components_in_firmware.txt - File explaining how to use the above tools to extract and examine the Billion/Telewell ADSL firmware updates. gpl_components_in_firmware2.txt - File explaining how to use the above tools to extract and examine the Billion/Telewell firewall/switch firmware updates. -- Harry Sintonen http://creativecommons.org/licenses/by-nc/2.5/