It's there so the enduser can use it if they need it. I would argue that, if software is swapping the code page out from underneath the user's feet — especially if it isn't properly restored after (and from what Yasuhiro says, it basically CAN'T be properly restored in at least some cases), then using it that way is most definitely a hack.
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
It's there so the enduser can use it if they need it. I would argue that, if software is swapping the code page out from underneath the user's feet — especially if it isn't properly restored after (and from what Yasuhiro says, it basically CAN'T be properly restored in at least some cases), then using it that way is most definitely a hack.