In: Computers and Technology

Submitted By luckydip7
Words 1299
Pages 6
Daniel Martinez
Charles Mullin
11 June 2013
What is Jailbreak? Whenever a new popular phone came out you would notice it. Back when I was in Junior high I would see the Motorola Razr in almost everyone in my classmates’ hand that had a phone. It was the “must have” phone. When Apple released its first iPhone, back in June of 2007, it was one the fastest growing phones on the market. Because of the new features the iPhone had to offer, it sparked ideas and numerous possibilities. With the following of the new iPhone generations, new ideas were added into them and became more and more popular. But to some people they wanted those ideas already on the iPhone. Shortly, after the first iPhone, came Jailbreak. This allowed expanding those ideas on the iPhone. According to an article by Forbes, dating February 8, 2013, nearly seven million iPhone, iPad and iPod touch owners have cracked Apple’s restrictions on their devices using the jailbreaking tool Evasi0n in four days making it the most popular Jailbreak ever. Jailbreak gives people the ability to customize their Apple devices. I will explain more about what Jailbreak is, as well the themes, apps, and tweaks.
So what is Jailbreak? By definition from the book “iOS Hacker’s Handbook,” states that “Jailbreak is the process of removing the limitations on Apple devices running the iOS operating system through the use of software and hardware exploits.” Jailbreaking will allow the user to personalize and customize their device. While this sounds amazing, it still has its disadvantages. For instance, your device is more vulnerable to an attack. Devices could possibly get corrupted and crash. According to an article from Computer News Middle East, published on February 7, 2013, states that “It is not illegal to Jailbreak an iPhone or iTouch device, but may void the device’s service warranty.” So let’s say you…...

Similar Documents

A Year Abroad

...from the stress of school for awhile… This place has literally become your second home! Golden House/ Lan Hong – Every engineer’s favourite lunch spot! Piping hot roasted duck, salt and pepper prawns… a treat especially during the bitter winter days where cold sandwiches just aren’t going to cut it. The über friendly shop owners are definitely a welcoming sight! Who knows, when you get to know them well enough they might just upgrade your portion! ;) Europe – With Europe in the backyard of UK, travelling is often a luxury taken for granted. You could pop over to France for the weekend and be back in time for lectures on Monday – complete with Ladurée macaroons for tea to make you the envy of the entire lunchroom. Or you could join Jailbreak and backpack around Europe (or even further) for charity! In short, an exchange in Cambridge has definitely been a most eye-opening and enriching experience that I’m grateful for. And much love and thanks goes out to everyone and CUMSA for making it a home away from home. ...

Words: 958 - Pages: 4

Satire as a Mechanism to Awareness in Mark Twain's Huckleberry Finn

...of the belief that while “borrowing” watermelons, roosting chickens, and canoes is fine, taking a slave is a despicable thing. While Jim was horrified that the Widow would sell him down the river for 800 dollars, Huck is only distressed when Jim is sold out from under him for a measly forty dollars. Thus, the concept of the value of a slave as commodity rather than man demonstrated. Splitting up a family to sell them down the river to different masters was widely considered acceptable as long as a good price was gained. Conversely, when a steamboat accident killed a slave it was interpreted as lucky that no one had been hurt. Worst of all is the perhaps unwitting cruelty with which Tom treats Jim in having insisted on a farcical jailbreak when his freedom could have been obtained efficiently and quietly. Tom, knowing that Jim was already a free man, could have immediately rescued him from the shed and perhaps even reunited him with his much missed family. Instead, he insisted that the release must be done properly, thus increasing the time and potential for danger both unnecessarily and exponentially. Regardless, Tom persisted in his plans and was shot for his troubles. While it might be hoped that this was justice for the treatment of Jim, Jim was the person who paid the price in the end, and was snatched up from where he watched with a doctor over the ill Tom, and dragged back into captivity. As a reward for his loyalty to Tom, Jim was treated to a cessation......

Words: 1294 - Pages: 6


...Dan Schutzer, CTO of BITS, the technology policy division of The Financial Services Roundtable said that, “Mobile phones are already equipped with cameras that could be used for facial recognition or iris detection, and microphones for voice detection. These technologies can strengthen user and device authentication and augment security practices” (GTCSS, 2012, p. 4). * Creating a solid device security management system: Assess the security architecture and features in the mobile browser and the underlying operating system, and churn out regular security patches and updates to fix vulnerabilities. * User awareness: working with users on smart and safe browsing practices as well as refrain from jail-breaking their smartphones. Jailbreak is a root exploit allows a user to evade vendor restrictions on a smartphone to enable user with complete control of the phone's software stack. According to Shinder (2010), “The primary purpose of jail-breaking in the context of smartphones is to allow the phone to install and run third-party applications that haven’t been approved by Apple. Phones that are not jail-broken can only run applications obtained through Apple’s App Store” (Shinder, 2010). 3. Assess and describe the value of cryptomengraphy and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices. Assessment of the value of cryptography and encryption based on the ability to protect data from unauthorized parties......

Words: 1994 - Pages: 8

Term Project

...because it is not used by one person; a Russian developed the source code and then licenses the program to people who will pay for it, which is sold for $3,000-$4,000 (Collinson, 2011). Trojans can enter a smartphone very easily; it can come in the form of a link or attachment like sending a vCard which is the SMS version of a business card. After clicking on one of these links or attachment the Trojan can be installed in a few short seconds. At public Wi-Fi hotspots hackers can create a copy of a hotspot service that phones auto-connect to and then all traffic conducted while on this hotspot is decrypted or shown in plain sight to the host (Collinson, 2011). There are several ways to keep mobile devices secure. People like to “jailbreak” their iPhones but this makes it more susceptible to attack, especially because you lose updates to the operating system. If you use a public hotspot don’t do any kind of banking or financial transaction. Only install applications from trusted sources, like Google Play Store; don’t go to internet websites for apps. A lot of scammers send out mass texts to random numbers with an attachment, do not open the attachment until you have confirmed that it is legitimate, because in most cases the attachment is malicious (Collinson, 2011). How does a system know it is infected? Detection of a Trojan can be difficult, since it is not a normal computer virus the Trojan program is not a program that infects other programs. A network......

Words: 1672 - Pages: 7

Rim Research

... they   had  to  use  proprietary  servers  and  systems  with  high  initial  fixed  costs.  This  makes   it  extremely  costly  to  move  to  another  system,  but  also  the  second  reason:   BlackBerry’s  are  still  the  gold  security  standard.  A  Forrester  Research  report   concluded,  “the  iPhone  and  iPad  are  secure  enough  with  the  right  policies  and   technical  controls.  Overall,  the  iPhone  can  be  an  approved  second  smartphone  in  the   enterprise  …  However,  the  inability  to  close  jailbreaks  will  give  enterprises  an   excuse  to  avoid  Apple’s  platform”  said  Forrester.  Apple’s  iPhone  and  iPad  are   increasingly  being  adopted  in  the  enterprise  and  secure  enough  for  most  firms,  but   high-­‐security  companies  are  likely  to  stick  with  Research  in  Motion’s  BlackBerry   platform.  John  Herrema,  senior  vice  president  of  corporate  strategy  at  Good   Technology  said,   “(RIM)  will  have  a  lot  more  competition.  The  market  opportunity  for  Android   and  Apple  in ......

Words: 2464 - Pages: 10

How to Jailbreak an Iphone

...How to jailbreak your iPhone, iPod, or iPad By Alora Uy Guerrero | TechnoStorm How Tos – Wed, Aug 14, 2013 * Email * Share * * If you own at least one iPhone, iPod, or iPad, then you've probably come across the curious act known as jailbreaking.  In geek terms, jailbreaking something is the process of exploiting a bug or system flaw on an iDevice to eliminate Apple-imposed restrictions and gain privileged access. In other words, you get access to resources that would be otherwise unavailable on your stock Apple product. Heck, jailbreaking even allows you to completely change the way your iDevice looks and functions and make it more like—dare we say it—an Android.   Obviously, the biggest tradeoff to any jailbreak method is that it voids your warranty from Apple, which means the company—and by extension, the store you bought your iDevice from—are no longer obliged to uphold any warranty claim, much less repair your hardware if it ends up being a very expensive paperweight.   It may also lead to performance issues, but this one's more of a consequence to pulling the trigger on apps, extensions, or themes too quickly without waiting for feedback first.   >>READ ALSO: How to turn your Windows laptop into a hotspot If all of this sounds compelling and reasonable to you, then you may want to stick around as we guide you through the process of liberating your iOS device from Apple's ironhanded constraints with the help of Evasi0n, our jailbreak......

Words: 535 - Pages: 3

Android and Apple Abstract

...operating system allows apps and other media content to run on various android and other DLNA devices. Android is less restrictive than Apple phones. Android’s customizable software/hardware features include that you can install a custom launcher. Changing home screens, widgets, live animation wallpaper. You can change completely how your phone looks. Apple’s IPhone which you are limited to the fonts and few other things doesn’t allow for the scale of options one can have. Widgets can be used on android.  The Android phone dialer can be changed to just about any look and feel that a user wants. Rooting and boot loader unlocks is also unique on android. It gives more control over a user phone. Rooting/boot loader is like Apple’s IPhone jailbreak but better. You can uninstall bloat ware. Carrier specific apps and media on phones which take up more of phone’s resources) It adds more customization on your phone. You can install custom roms. Some android phones are cheaply made while others are premium. Apple phone are mostly premium even those have lesser model phones. Gadgets running the Android Operating System are adaptable such that the UI (User Interface) empowers clients to multitask capacities and different purposes. The adaptability empowers clients to perform two capacities at once without needing to close different applications. Actually, the Apple ios permits clients to execute one capacity at once and passageway running applications when they have to open an alternate...

Words: 429 - Pages: 2

Cis 500 Term Paper

...technology grows so has to the ability to protect it at all costs. Listed below are some other tips that can be used to make the computer more secure:   * Label your device with your name and a phone number where you can be reached to make it easy to return to you if it is lost.   * Configure a pass code to gain access to and use the device. This helps prevent unauthorized individuals from gaining access to your data.   * Set an idle timeout that will automatically lock the phone when not in use. This also helps prevent unauthorized individuals from gaining access to your data.   * Keep all software up to date, including the operating system and installed "Apps". This helps protect the device from attack and compromise...   * Do not "jailbreak" or "root" your device. "Jailbreaking" and "rooting" removes the manufacturer's protection against malware.   * Enroll your device in a managed environment. This helps you configure and maintain your security and privacy settings.   * Enroll your device in Find My iPhone or an equivalent service. This will help you locate your device should it be lost or stolen.   * If your device supports it, ensure that it encrypts its storage with hardware encryption. In conjunction with a management service or "Find My iPhone," this can allow data to be removed quickly in the event that the device is lost or stolen These are great tips to protect your phone from potential unsafe situations. A few more that are more detailed are turning on......

Words: 2148 - Pages: 9


...high-quality peripherals -Sensible screen sizes -Still the best-looking phones on the market -All the apps you could ever need -Easy integration with other Apple devices -Strong security  -Fingerprints -Elegant designs Samsung Galaxy Note 4 Disadvantages : -Memory extension with microSD supports only up to 64 GB. -Lack of  water and dust resistance - Weak security -Easy infected by virus -Weak signal receiver Advantages : -Offers 5.7 inch screen -Sleek and stylish design -Supports almost Connectivity -Great features -Price suitable with features -No need jailbreak Sony Xperia Z3 Disadvantages : -Comes with Non user-replaceable battery -Front camera has only 2.2MP where as Samsung Galaxy Note 4 is providing 3.7MP -Permanent notifications : some applications like Lifelog and My Data Manager create a -kind of immortal notification on the Notifications Bar. -Glass: Coating is awful -Worst LED flash Advantages : -It comes with dust proof and water resistant over 1 meter and 30 minutes. -One of the Slimmest smart phone -It offers 20.7MP rear camera -Cheap with great features 4 Purchase Decision After comparing that 3 phones, I decided to bought iphone 5s It was triggered by both external......

Words: 1089 - Pages: 5

Modifying Software on Apple Devices

...room” of the device. A hacker’s main goal is to bypass Apple’s checkpoints and modify this file, then to allow him or her to modify “root” files (Reddit). Once this is done, the hacker can modify system files and disable Apple’s security measures. Thus, the hacker has gone through a very boring and strenuous process, sometimes taking several months, simply to allow unapproved apps and code to run on an iOS device. After all this work, it would be quite annoying for an iPhone user to have to re-jailbreak their device every time they turn it on. However, this is sometimes the case. Depending on the effectiveness of a hacker’s exploits, a jailbreak’s effects may persist after a user turns off their phone, or they may completely disappear. An untethered jailbreak is a jailbreak in which the effects persist, while a tethered jailbreak is one in which the effects disappear (Miller). Obviously, an untethered jailbreak is much more desirable to iPhone users. However, these types of jailbreaks are much more difficult to create, and they take longer to be released publicly. All of this talk about hacking most likely causes one to wonder about the legality of jailbreaking. Most people assume that jailbreaking Apple devices is very illegal, causing them to avoid modifying their device’s software. While there was originally much grey area surrounding the legality of jailbreaking iPhones, a 2010 revision to the Digital Millennium Copyright Act (DMCA) cleared matters up. In this revision,...

Words: 2781 - Pages: 12


...Instruction provided by iclarified.com Phone | How to Unlock the iPhone 3G   Thursday, 1st January 2009, 10:01 am      These are instructions on how to software unlock the iPhone 3G for use with any GSM cellphone carrier. Before you can follow these instructions you must have a jailbroken iPhone and you must be on the 02.28.00 baseband(modem firmware). This means that you must be running the 2.2 firmware. If you used PwnageTool to update to 2.2 from 2.1 you will have to re-jailbreak using a QuickPwn jailbreak tutorial for the time being. To find your firmware and modem firmware(baseband) versions you can follow this tutorial. If you are not on firmware version 2.2 and baseband version 02.28.00 then you need to follow one of these tutorials before unlocking: Mac, Windows [pic]Watch the Video! For your convenience this tutorial is available in video format also. Click the Watch It button to view the tutorial! Step One Press to launch Cydia Installer from your SpringBoard. [pic] Step Two Press to select the Manage tab at the bottom of the screen. [pic] Step Three Press to select the large Sources button [pic] Step Four Press the Edit button at the top right of the screen. [pic] Step Five Press the Add button at the top left of the screen. [pic] Step Six Enter http://apt9.yellowsn0w.com/ as the source url and press the Add Source button. [pic] Step Seven Once the source has been added press the large Return to Cydia......

Words: 997 - Pages: 4

Tying Method

...controversy, bringing the concepts of jailbreaking and bricking into the mainstream debate over the future of smartphone technology. After a year and a half of negotiations, Steve Jobs reached an agreement with the wireless division of the telecomm giant AT&T to be the iPhone's carrier. In return for five years of exclusivity, roughly 10 percent of iPhone sales in AT&T stores, and a thin slice of Apple's iTunes revenue, AT&T granted Apple roughly $10 a month from every iPhone customer's AT&T bill. In return, consumers were unable to use any other carrier without heavily modifying their device. Apple retained complete control over the design, manufacturing, and marketing of the iPhone. Since some customers were trying to jailbreak their iPhone to avoid the AT&T network, AT&T decided to charge consumers if they were to leave the network. This caused complaints among many consumers, as they were forced to pay an additional early termination fee of $175 to end the contract, and the device would remained locked. Other companies such as Google complained that tying encourages a more closed-access-based wireless service. After the iPhone was released, questions arose about the legality of Apple's arrangement, and in October 2007 two class-action lawsuits were filed against Apple, one in federal court and the other in state court. The suits claimed that Apple's exclusive agreement with AT&T violated California antitrust law. The suit was......

Words: 914 - Pages: 4

Animal Intelligence

...Stones chewed out his staff, and the incident was forgotten. But the next time the weather was nice, Fu Manchu escaped again. Fuming, Stones recalls, "I was getting ready to fire someone." The next nice day, alerted by keepers desperate to keep their jobs, Stones finally managed to catch Fu Manchu in the act. First, the young ape climbed down some air-vent louvers into a dry moat. Then, taking hold of the bottom of the furnace door, he used brute force to pull it back just far enough to slide a wire into the gap, slip a latch and pop the door open. The next day, Stones noticed something shiny sticking out of Fu's mouth. It was the wire lock pick, bent to fit between his lip and gum and stowed there between escapes. Fu Manchu's jailbreaks made headlines in 1968, but his clever tricks didn't make a big impression on the scientists who specialize in looking for signs of higher mental processes in animals. At the time, much of the action in animal intelligence was focused on efforts to teach apes to use human languages. No researcher cared much about ape escape artists. And neither did I. In 1970, I began following studies of animal intelligence, particularly the early reports of chimpanzees who learned how to use human words. The big breakthrough in these experiments came when two psychologists, R. Allen and Beatrice Gardner, realized their chimps were having trouble forming wordlike sounds and decided to teach a young female named Washoe sign language instead.......

Words: 889 - Pages: 4

Drug Game

...property! - You MAY NOT leave behind and or lock ANY of the crafting tables or stoves in ANY of these or inferred areas. - You MAY NOT lock any of your drug equipment and or furniture in an open area. ───────────────────────────────────────────────────────────── Civilian Sided - You CANNOT steal EMS vehicles - You CANNOT steal Fire Department vehicles ───────────────────────────────────────────────────────────── Hostages, Jailbreaks, Mugging - You CANNOT take over the jail. - You CANNOT do a jailbreak with less than 6 cops online. - You CANNOT raid a house with less than 2 cops online. - You CAN request a MAXIMUM of $5.000, PER single hostage. - You ARE NOT allowed to force someone to take money out of the ATM. - You ARE NOT allowed to force someone to take items out of the bank storage. - You MAY NOT rob someone for his/her money. - You CANNOT take a cop hostage with less than 3 cops online - You CANNOT take the police negotiator hostage during negotiations - When doing a jailbreak, the person must be in the actual jail cell, not in the holding cell. - If you SUCCEED in your jail break, you must LEAVE STRAIGHT AWAY (you can’t stay in the PD and kill people). - You ARE NOT allowed to take hostages in public, it must be in secluded areas. ───────────────────────────────────────────────────────────── Server Restarts - IF the server restarts whilst you are detained you MUST log-back-in UNLESS told otherwise by your......

Words: 2731 - Pages: 11

Bus 375 Learning Consultant /Snaptutorial.Com

...week’s lecture describes the advantages and disadvantages of using Kirkpatrick’s taxonomy. As an HR employee tasked with creating and evaluating a training course for your organization, how would you use Kirkpatrick’s taxonomy to evaluate the training? What could you do to minimize the disadvantages of the tool? Use this week’s lecture as a basis for your post. Reference and cite the textbook in your original post. Respond to at least two of your classmates’ posts. ----------------------------------------------------------------------- BUS 375 Week 3 DQ 2 Beta Testing For more classes visit www.snaptutorial.com Beta-Testing [CLO: 2]. 1st Post Due by Day 3. Read the article “Apple is Beta-testing an Update that Kills Evasion Jailbreak.” In the textbook, beta-testing is described as used for formative evaluation and for fine-tuning. How does the story of Apple’s beta-test meet the criteria? ----------------------------------------------------------------------- BUS 375 Week 3 E-learning for Training and Potential Barriers For more classes visit www.snaptutorial.com E-learning for Training and Potential Barriers [CLOs: 2, 4]. Due by Day 7. In Chapter Five of the textbook, e-learning as a method of training is discussed. In Chapter Six, potential barriers of e-learning readiness to implementing e-learning as a training method are examined. In a two- to three- page paper (excluding the title and reference pages), examine e-learning and the barriers.......

Words: 1715 - Pages: 7