External Keyboard With An IPhone

iphone

Using an IR keyboard is now possible with a non jailbroken iPhone. The folks at perceptive development have developed a custom interface that connects through the headphone jack.  They had already developed the serial modem, so this was just another step at connecting peripherals. With some smart and small packaging, this could be a nice attachment to keep around. You can see a video of it in action after the break.

Continue reading “External Keyboard With An IPhone”

IPhone 3G Unlock Video

musclenerd

To appease people waiting for the iPhone 3G unlock, iphone-dev team member [MuscleNerd] did a live video demo this afternoon. The video shows him removing the AT&T SIM and putting in a T-Mobile SIM. After the switch, the phone shows no connectivity. He then runs “yellosn0w” in an SSH session with the phone. The phone then unlocks without needing to be rebooted and the signal bars appear. The final test shows the phone receiving a call.

The target for this release is New Year’s Eve and it doesn’t support the most recent baseband. Well be attending the 25C3 talk hosted by [MuscleNerd] and other team members. The VNC screen you see in the video is thanks to [saurik]’s Veency.

IPhone Pwnage Tool 2.0 Released


Earlier today, the iPhone Dev Team teased that they wouldn’t release their latest Pwnage Tool until Sunday. Since this was yet another in a week long bit of teasing, we were somewhat surprised when a few hours later they posted a rather relaxed Thanks for waiting :) post announcing that Pwnage Tool 2.0 is available. Here’s a direct link to the tool and a mirror courtesy of [_BigBoss_].

According to TUAW, Pwnage Tool 2.0 will activate, jailbreak, and unlock first generation iPhones running any firmware up to and including version 2.0. Unfortunately, it will not unlock an iPhone 3G (at least, not yet). iPhone 3G owners can still use the tool for activation and jailbreaking (so you can run 3rd party apps not supported by Apple and the new iPhone App Store).

So far, skimming through the 1322 comments on their announcement post, I’ve not seen any complaints or death threats about the tool bricking iPhones, but one should still proceed with caution. According to one update to the post, some people either get an error 1600 from iTunes or they notice a “failure to prepare x12220000_4_Recovery.ipsw” in the log. They’ve provided a workaround, however. If this happens to you, simply mkdir ~/Library/iTunes/Device Support or alternately nuke all the files in that already extant folder and re-run Pwnage Tool.

UPDATE: Image is from Engadget’s iPhone review we covered earlier.

New Vs. Old IPhone Apps


You’ve probably never heard of this obscure new device called the iPhone 3G from no-name manufacturer Apple, but we decided to give a rundown of some of its newest apps anyway. We’ll be comparing them to non-SDK third-party apps that only work on jailbroken iPhones.

Continue reading “New Vs. Old IPhone Apps”

IControlpad, IPhone Gamepad


[CraigX] has been dabbling in iPhone accessories lately by adding a gamepad. Called the iControlpad it surrounds the iPhone making it look very PSP like. As anyone who has jailbroken and installed emulators probably knows, without feedback the touch screen based buttons are less than great.

The unit is currently a prototype however there are plans to produce and sell the units. They have received support from Zodttd, an organization that has created iPhone apps like snes4iphone and genesis4iphone. The developers also state they’ll provide source and SDK support. The sparse development blog announces their success using a hacked up SNES controller over the docks serial connector, but they provide absolutely no details.

[via Engadget]

It’s All In The Libs – Building A Plugin System Using Dynamic Loading

Shared libraries are our best friends to extend the functionality of C programs without reinventing the wheel. They offer a collection of exported functions, variables, and other symbols that we can use inside our own program as if the content of the shared library was a direct part of our code. The usual way to use such libraries is to simply link against them at compile time, and let the linker resolve all external symbols and make sure everything is in place when creating our executable file. Whenever we then run our executable, the loader, a part of the operating system, will try to resolve again all the symbols, and load every required library into memory, along with our executable itself.

But what if we didn’t want to add libraries at compile time, but instead load them ourselves as needed during runtime? Instead of a predefined dependency on a library, we could make its presence optional and adjust our program’s functionality accordingly. Well, we can do just that with the concept of dynamic loading. In this article, we will look into dynamic loading, how to use it, and what to do with it — including building our own plugin system. But first, we will have a closer look at shared libraries and create one ourselves.

Continue reading “It’s All In The Libs – Building A Plugin System Using Dynamic Loading”

Careless With Your Jailbreak? You’ll Get Rickrolled

iKee-Rickrolling-iPhone-Worm

Here’s further proof that you should understand what it is you’re doing when you go to hack your handheld. Jailbreaking an iPhone has been made quite easy to the point that a lot of folks do it without reading any of the accompanying documentation. Those who didn’t heed the warning to change the default SSH password on a Jailbroken phone might get a bit of a surprise. A worm has been unleashed that finds Jailbroken iPhones and changes the background image to a picture of [Rick Astley]. That’s right, they’ve been Rickrolled.

It’s a clever little devil that propagates by grabbing the IP address of the iPhone it is currently on, then testing all of the IP address in that family to find other devices using the default password. Luckily this worm’s activities are not what we’d call malicious. It doesn’t format the root or create a cell based bot-net (that we know of). This would be akin to the antics of searching Google for unprotected installations of MythWeb and setting some poor schmuck’s MythTV to record every infomercial ever. The point is, this could have been a lot worse, but the attack is predicated on stupidity. In our digital age, why are people leaving default passwords in place?