Instant Jailbreak for iPhone and iPod touch

Afraid of bricking your iPhone, or not as savy as most to jailbreak your iphone? Well a group hackers have released an instant jailbreak online. You just need to point your iPhone’s Safari to http://jailbreakme.com/ and follow the on screen instructions. A crew of hackers (including hdm/metasploit, rezn, dinopio, drudge, kroo, pumpkin, davidc, dunham, and NerveGas) have introduced a one-touch instant jailbreak for both iPhone and iPod touch. The jailbreak opens your iPhone for full disk access and installs Installer.app so you can add pretty much any third party application you like.

Afraid of bricking your iPhone, or not as savy as most to jailbreak your iphone? Well a group hackers have released an instant jailbreak online. You just need to point your iPhone’s Safari to http://jailbreakme.com/ and follow the on screen instructions.

A crew of hackers (including hdm/metasploit, rezn, dinopio, drudge, kroo, pumpkin, davidc, dunham, and NerveGas) have introduced a one-touch instant jailbreak for both iPhone and iPod touch. The jailbreak opens your iPhone for full disk access and installs Installer.app so you can add pretty much any third party application you like.


Did you like this article?


0 Shares:
You May Also Like

Microsoft flip-flops again: now no Vista Home on Macs

I can't believe this is happening, twice in a week two Microsoft proposed changes to allow more functionality and portability are squashed like a bug. This is not going to make consumers happy, and will drive some of them into Apple's arms, and possibly Ubuntu's.
Microsoft flip-flops again: now no Vista Home on Macs -

Filed under: ,

We've seen our fair share of flip-flopping in the past, and Microsoft is yet again adding its name to the frowned upon list by retracting previous intentions to allow Windows Vista Home and Home Premium operating systems to run under virtualization. After reportedly stating that it would "change the EULA after listening to customer feedback on the issue," it appears that the suits in Redmond have thought better of said decision. Now, the firm has "reassessed the Windows virtualization policy and decided that maintaining the original policy announced last Fall" would be best. Ben Rudolph, Parallels director of corporate communications, noted that he was "obviously disappointed" in Microsoft's change of heart, but if the two-faced Mac users out there can persuade Google to take their side, we're sure this little spat could be cleared up in no time.

[Image courtesy of ElliottBack]

 

Read | Permalink | Email this | Comments


Office Depot Featured Gadget: Xbox 360 Platinum System Packs the power to bring games to life!

[EnGadget]
Read More

WoW Database Site Sells for $1 Million

WoW Database Site Sells for $1 Million - MattHock writes "Wowhead (a WoW information database) has to ZAM (Affinity Media) for the price of $1 Million. ZAM is the owner of several other WoW databases, including Thottbot and Allakhazam. Until recently Affinity was also the owner of IGE, a highly controversial company that sold in-game wealth for real life money. Affinity recently sold IGE, which Wowhead claims as the reason they allowed the sale to go through. But did ZAM really sell IGE? The blogger who put this story online doubts that IGE and ZAM have actually distanced themselves. He believes that the supposed sale was just actually a means of restructuring to hide the relationship, similar to how IGE's relationship to Thottbot was hidden for a number of months through a convoluted set of parent companies."

Read more of this story at Slashdot.

[Slasdot]
Read More

Detect insider threats with Linux auditing

Detect insider threats with Linux auditing -

Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

[Linux.com]
Read More