Premium Essay

How to Jailbreak an Iphone

In:

Submitted By annestie
Words 535
Pages 3
How to jailbreak your iPhone, iPod, or iPad
By Alora Uy Guerrero | TechnoStorm How Tos – Wed, Aug 14, 2013 * Email * Share * *
If you own at least one iPhone, iPod, or iPad, then you've probably come across the curious act known as jailbreaking.
In geek terms, jailbreaking something is the process of exploiting a bug or system flaw on an iDevice to eliminate Apple-imposed restrictions and gain privileged access. In other words, you get access to resources that would be otherwise unavailable on your stock Apple product.
Heck, jailbreaking even allows you to completely change the way your iDevice looks and functions and make it more like—dare we say it—an Android.
Obviously, the biggest tradeoff to any jailbreak method is that it voids your warranty from Apple, which means the company—and by extension, the store you bought your iDevice from—are no longer obliged to uphold any warranty claim, much less repair your hardware if it ends up being a very expensive paperweight.
It may also lead to performance issues, but this one's more of a consequence to pulling the trigger on apps, extensions, or themes too quickly without waiting for feedback first.
>>READ ALSO: How to turn your Windows laptop into a hotspot
If all of this sounds compelling and reasonable to you, then you may want to stick around as we guide you through the process of liberating your iOS device from Apple's ironhanded constraints with the help of Evasi0n, our jailbreak software of choice.
The latest version of Evasi0n is compatible with iPhone, iPod, and iPad models running iOS versions 6.0 through 6.1.2.
Before going any further, we highly suggest that you do three things to make your jailbreaking experience as problem-free as possible:
1. If you're using a Windows-based machine, download and install Apple iTunes. Back up your iPhone, iPod, or iPad using the

Similar Documents

Premium Essay

Modifying Software on Apple Devices

...Modifying Software on Apple Devices My Name Class Teacher 29 May 2013 Modifying Software on Apple Devices Apple, Inc. completely changed our view of cell phones and computers when it introduced the first iPhone in 2007 (Miller). With such an amazing, versatile technology entering the world marketplace, iPhone security immediately became an issue. “Jailbreaking,” or modifying the iPhone’s software to allow complete control over it, quickly became popular. Over the course of the iPhone’s existence, jailbreaking has become more and more important in the Apple community. However, jailbreaking has also struck up much controversy as its legality and effects are questioned. The word “revolutionary” is an understatement when describing the iPhone. This single device kicked off a technological revolution in which personal computers were redefined. Prior to the iPhone, the most advanced cell phones had only very basic web browsers, poor cameras, and simple user interfaces. With the iPhone came a much faster web browser, photo and music storage, a nicer camera, and the iPhone’s touch screen display made the device extremely intuitive and user-friendly. However, this first iPhone had many shortcomings to be fulfilled. Data speeds were lacking, the operating system had little security, and the user could not install non-Apple, or third-party, apps (Miller). The iPhone’s first operating system was named after Apple’s computer operating system, “OS X”. Cisco’s operating system...

Words: 2781 - Pages: 12

Premium Essay

Krneki

...Instruction provided by iclarified.com Phone | How to Unlock the iPhone 3G   Thursday, 1st January 2009, 10:01 am      These are instructions on how to software unlock the iPhone 3G for use with any GSM cellphone carrier. Before you can follow these instructions you must have a jailbroken iPhone and you must be on the 02.28.00 baseband(modem firmware). This means that you must be running the 2.2 firmware. If you used PwnageTool to update to 2.2 from 2.1 you will have to re-jailbreak using a QuickPwn jailbreak tutorial for the time being. To find your firmware and modem firmware(baseband) versions you can follow this tutorial. If you are not on firmware version 2.2 and baseband version 02.28.00 then you need to follow one of these tutorials before unlocking: Mac, Windows [pic]Watch the Video! For your convenience this tutorial is available in video format also. Click the Watch It button to view the tutorial! Step One Press to launch Cydia Installer from your SpringBoard. [pic] Step Two Press to select the Manage tab at the bottom of the screen. [pic] Step Three Press to select the large Sources button [pic] Step Four Press the Edit button at the top right of the screen. [pic] Step Five Press the Add button at the top left of the screen. [pic] Step Six Enter http://apt9.yellowsn0w.com/ as the source url and press the Add Source button. [pic] Step Seven Once the source has been added press the large Return to Cydia button. [pic] ...

Words: 997 - Pages: 4

Premium Essay

Iphone Persuasive Essay

...Ding! Notifications everywhere you go. You’ve probably forgot when the first iPhone came out, and what features it had, and how it evolved into your 6s or 5s/5c or even your iPhone 4. Don’t ask Siri, read this! Why? The iPhone has changed lives. How did the iPhone come all this way? The first iPhone was said to be an iPod, a phone, and an internet device all in one by Steve Jobs himself. Well, the first gen. iPhone had a mobile browser, yes. It had capabilities of an iPod, and it is a phone. But, back then, there was no 4G LTE. No third-party apps. It didn’t have multi-touch, but it was so expensive back then. Steve jobs needed another, better iPhone that was less expensive. 1. The iPhone 3g was better than the iPhone first gen., in ways like...

Words: 622 - Pages: 3

Premium Essay

Android and Apple Abstract

...the planet. Every mobile phone has hardware and a specialized software called an operating system. There are a lot mobile operating systems available. Android is a software stack-set of software subsystems needed to deliver a fully functional solution for mobile devices. The iOS is a mobile operating system that allows all other apps to run on an iPhone, iPod Touch or iPad. Androids OS mobile operating system allows apps and other media content to run on various android and other DLNA devices. Android is less restrictive than Apple phones. Android’s customizable software/hardware features include that you can install a custom launcher. Changing home screens, widgets, live animation wallpaper. You can change completely how your phone looks. Apple’s IPhone which you are limited to the fonts and few other things doesn’t allow for the scale of options one can have. Widgets can be used on android.  The Android phone dialer can be changed to just about any look and feel that a user wants. Rooting and boot loader unlocks is also unique on android. It gives more control over a user phone. Rooting/boot loader is like Apple’s IPhone jailbreak but better. You can uninstall bloat ware. Carrier specific apps and media on phones which take up more of phone’s resources) It adds more customization on your phone. You can install custom roms. Some android phones are cheaply made while others are premium. Apple phone are mostly premium even those have lesser model phones. Gadgets running the Android...

Words: 429 - Pages: 2

Free Essay

Rim Research

...Sriram  Prakash   Econ  106T   Research  in  Motion:  Are  BlackBerry’s  too  secure?   Research  in  Motion  –  RIM,  best  known  for  it’s  BlackBerry  device,  is  currently   facing  increasing  pressure  from  developing  nations  to  grant  governments  access  to   BlackBerry  encrypted  data.  This  demand  from  RIM’s  crucial  future  markets  like   India,  China,  Saudi  Arabia,  and  the  UAE  poses  several  long-­‐term  strategy  questions   for  RIM  and  is  a  result  of  RIM’s  product  differentiation  in  the  market  place.  Instead   of  simply  offering  a  phone  solution  RIM  goes  one  step  further  and  provides  servers   essential  for  the  encryption  and  security  of  data.  The  data  governments  are   demanding  access  to  compromise  of  BIS  –  BlackBerry  Internet  Service,  the  personal   e-­‐mail  service  offered  by  RIM;  BES  –  BlackBerry  Enterprise  Server,  the  enterprise  e-­‐ mail  service,  and  BBM  –  BlackBerry  Messenger,  which  is  an  international  messaging   feature  used  for  inter-­‐blackberry  communications...

Words: 2464 - Pages: 10

Free Essay

Mobile Operating Systems

...Term Paper on Mobile Operating Systems Submitted to Amity School of Engineering and Technology Guided By: Made By: Ms. Ankur Chaudhary Sagar Nenwani, 6CSE4X A2305213340 AMITY UNIVERSITY, UTTAR PRADESH GAUTAM BUDDHA NAGAR Declaration I, Sagar Nenwani, student of B.Tech (CSE) hereby declare that the project titled “Mobile Operating Systems” which is submitted by me to Department of Computer Sciences, Amity School of Engineering and Technology, Amity University Uttar Pradesh, Noida, in partial fulfillment of requirement for the award of the degree of Bachelor of Technology in Computer Science, has not been previously formed the basis for the award of any degree, diploma or other similar title or recognition. The Author attests that permission has been obtained for the use of any copy righted material appearing in the project report other than brief excerpts requiring only proper acknowledgement in scholarly writing and all such use is acknowledged. Sagar Nenwani 6 CSE 4 (x) A2305213486 May 7’ 2016 Certification This is to certify that Mr. Sagar Nenwani, student of B.Tech. in Computer Science has carried out the work presented in the project of the term paper entitle "Mobile Operating Systems"...

Words: 3460 - Pages: 14

Premium Essay

Term Project

...The Workings of Trojan Horse Viruses Name School In Partial Fulfillment of the requirements for Class Professor Due Date Abstract Since the beginning of computer security one form of malware has always been a thorn in everyone’s side, it is one of the oldest and most commonly misunderstood malware and people hardly ever see it coming. It is the Trojan horse; a piece of programming code disguised as another program or file. This paper discusses how Trojans function, the damage Trojans cause and how Trojans can be prevented. The Workings of Trojan Horse Viruses What is a Trojan Horse Virus? Computer Trojans emerged in the mid-1980’s as a way to infect software and distribute the infected payload to different systems without raising suspicion. Trojans are not like viruses or worms per se, Trojans are malicious and cause damage but they are not self-replicating and don’t reproduce by infecting other files. Hackers have taken advantage of human nature with persuading the user to install a Trojan for the hacker by means of deception (Greenberg, 2011). Trojans Spread by users, the Trojan is latched onto an enticing program like a popular game, screen saver or any other program the user finds legitimate. Trojans usually open a covert backdoor into a targets computer or server, once installed the Trojan gives a hacker access to man operations including: Data theft, crashing the victim’s system, installing key loggers, and viewing the user’s screen (Greenberg...

Words: 1672 - Pages: 7

Premium Essay

Smartphones Operating Systems

...Operating system : An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function. Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources. For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and will frequently make a system call to an OS function or be interrupted by it. Operating systems can be found on almost any device that contains a computer—from cellular phones and video game consoles to supercomputers and web servers. Examples of popular modern operating systems include Android, BSD, iOS, Linux, OS X, QNX, Microsoft Windows, Windows Phone, and IBM z/OS. All these, except Windows, Windows Phone and z/OS, share roots in UNIX. Smartphone A Smartphone, or smart phone, is a mobile phone built on a mobile operating system, with more advanced computing capability and connectivity than a feature phone. The first smartphones combined the functions of a personal digital assistant (PDA), including email...

Words: 15551 - Pages: 63

Premium Essay

Apple

...NANYANG BUSINESS SCHOOL AB311 STRATEGIC MANAGEMENT GROUP STRATEGIC REPORT ON APPLE INC. SEMINAR GROUP 2 TEAM GENIE Instructor: A/P LAI SI TSUI-AUCH Word Count: 5,999 Done by: CHAN ZHE YING GOH CHUWEN LEE KOK CHONG TEO KOK MIN JOHN 1 Table of Contents I. EXECUTIVE SUMMARY ............................................................................................................... 3 II. MAIN REPORT............................................................................................................................... 5 1. Introduction of Apple Inc. ........................................................................................................... 5 1.1 1.2 2. 2.1 History................................................................................................................................. 5 Current Business Strategy ................................................................................................... 5 SWOT Analysis ........................................................................................................................ 10 Promising Opportunities ....................................................................................................... 10 The Shift from the PC to Mobile Era ............................................................................ 10 Emerging Markets ......................................................................................................... 11 Consumer Digital Lifestyle...

Words: 8330 - Pages: 34

Premium Essay

Managing Strategy

...Contents Page Purpose 4 1. External Analysis 5 2.1 Industry Life Cycle............................................................5 2.2 Market Analysis....................................................................6 2.3 PESTEL.................................................................................7 2.4 Porters 5 Force ....................................................................8 2. Internal Analysis 9 2.1 Microsoft Competency Framework....................................9 2.2 Microsoft VRIN Framework.................................................10 2.3 Microsoft Strengths and Weaknesses ..............................10 2.4 Nokia Competency Framework...........................................11 2.5 Nokia VRIN Framework........................................................12 2.6 Nokia Strengths and Weaknesses......................................12 3. Issues and Challenges ...

Words: 6930 - Pages: 28

Premium Essay

Mobile Application Security

...SECURING A MOBILE WORLD Introduction Today’s smartphones and tablets are more than communication devices. They are hip-mounted personal computers, with more memory and processing power than your laptop of just a few years ago. They are an integrated part of our lives… personal and professional. The information they provide is so vital that the Army is piloting their use as standard field issue to every soldier, complete with combat-focused applications [1]. However, smartphones and tablets raise new security issues. They are more likely to be lost or stolen, exposing sensitive data. Malware risks are increased because they connect to the Internet directly rather than from behind corporate firewalls and intrusion-protection systems. Security of mobile devices focuses on controlling access through the use of device locks and hardware data encryption. While this may be sufficient for individual users, it is insufficient for defense needs. Many documented examples exist of hacking of the device lock, as well as defeats of the hardware-level encryption. Once the device is unlocked, there is generally unfettered access to all apps and their associated data. Military applications require additional application-level access controls to provide data security. Unfortunately, there are gaps in the application-level security model of the two predominant mobile operating systems: iOS from Apple and Google Android. Our ongoing research1 looks to address these gaps by developing innovative...

Words: 4009 - Pages: 17

Free Essay

A Hands on Intro to Hacking

...Penetration testing Penetration testing A Hands-On Introduction to Hacking by Georgia Weidman San Francisco Penetration testing. Copyright © 2014 by Georgia Weidman. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed in USA First printing 18 17 16 15 14   123456789 ISBN-10: 1-59327-564-1 ISBN-13: 978-1-59327-564-8 Publisher: William Pollock Production Editor: Alison Law Cover Illustration: Mertsaloff/Shutterstock Interior Design: Octopod Studios Developmental Editor: William Pollock Technical Reviewer: Jason Oliver Copyeditor: Pamela Hunt Compositor: Susan Glinert Stevens Proofreader: James Fraleigh Indexer: Nancy Guenther For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. directly: No Starch Press, Inc. 245 8th Street, San Francisco, CA 94103 phone: 415.863.9900; fax: 415.863.9950; info@nostarch.com; www.nostarch.com Library of Congress Cataloging-in-Publication Data Weidman, Georgia. Penetration testing : a hands-on introduction to hacking / Georgia Weidman. pages cm Includes index. ISBN 978-1-59327-564-8 (paperback) -- ISBN 1-59327-564-1 (paperback) 1. Penetration testing (Computer security) 2. Kali Linux. 3. Computer hackers. QA76.9.A25W4258 2014 005.8'092--dc23 2014001066...

Words: 117203 - Pages: 469