Featured Articles

TSMC: Volume production of 16nm FinFET in 2H 2015

TSMC: Volume production of 16nm FinFET in 2H 2015

TSMC has announced that it will begin volume production of 16nm FinFET products in the second half of 2015, in late…

More...
AMD misses earnings targets, announces layoffs

AMD misses earnings targets, announces layoffs

AMD has missed earnings targets and is planning a substantial job cuts. The company reported quarterly earnings yesterday and the street is…

More...
Did Google botch the Nexus 6 and Nexus 9?

Did Google botch the Nexus 6 and Nexus 9?

As expected, Google has finally released the eagerly awaited Nexus 6 phablet and its first 64-bit device, the Nexus 9 tablet.

More...
Gainward GTX 970 Phantom previewed

Gainward GTX 970 Phantom previewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
EVGA GTX 970 SC ACX 2.0 reviewed

EVGA GTX 970 SC ACX 2.0 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Monday, 17 March 2008 10:24

iPhone 2 hacked before release

Written by Nick Farell

Image

Give up, Steve Jobs


Toymaker
Apple's attempts to lock in iPhone users with its new iPhone 2.0 have already been defeated. The iPhone Dev Team has worked out how to hack into the iPhone's bootloader.

The hack takes advantage of the way the iPhone authorizes code that can be written to memory. This means that it will be possible to allow any applications that haven't been authorized by Apple to run on the iPhone.

According to News.com, the hacking community believes this jailbreaking method, which will also let you unlock your iPhone, can't be fixed by Apple in a production version of the 2.0 software. Many are wondering why Apple is trying to keep up its control freak, one-carrier, one-country only applications blessed by Steve Jobs's policy.

It seems to be wasting a lot of time and resources, while hackers just undo its work days afterward.

More here.
Last modified on Monday, 17 March 2008 14:18
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments