IPhone SSH Client Roundup

iPhone and keyboard
Considering an iPhone but not sure if you can live without SSH in your pocket? Have no fear! Hot off the press is this review of four SSH clients for the iPhone: iSSH, pTerm, TouchTerm, and SSH. All four clients have their strengths and weaknesses, and iSSH seems to be the best option so far. Although each of these is an early release, and therefore has its own idiosyncrasies, they’ve got improved features being planned for the next major release. Furthermore, they’re surprisingly inexpensive (none of them are more than five dollars), and so you should give them a shot if you see the need to SSH without being bound to your terminal.

iSSH is the best of the reviewed clients, giving you a good balance of usability and features. It has is share of problems, though, primarily related to the way it handles scrolling, pTerm comes in second, and is almost perfect. Its two rather glaring weaknesses are a too-large font that requires plenty of scrolling, and a lack of Ctrl, ESC, and Tab keys. TouchTerm, which comes in third, is the most configurable of the reviewed SSH clients,but is otherwise irrationally quirky. SSH is even quirkier than TouchTerm, and is a waste of your time and money.

Between the idiosyncrasies of iSSH, pTerm, and TouchTerm, you’re bound to find one that you like. Furthermore, these are initial releases; all three have exciting features on the roadmap (like implementing the ESC key) which should improve their usability.

Should you give one of them a try? For five bucks, it wouldn’t hurt.

[photo: edans]

[via Waxy]

USB Wall Charger


[rbhays] did this sweet little hack back in 2006. He took a Motorola cellphone wall charger and modified it into a USB wall charger. He needed to charge his iPod, but misplaced the original charger. A replacement would have cost him $30. So he did what any respectable hacker would do, he cut up something else to make it work for him.

He had one sitting around that was equipped with a mini USB end. He checked it out and it was the perfect voltage. Some commenters below the project noted that their motorola charger had a higher voltage rating than his. Those would still work, but would require some extra steps to bring the voltage down.

After some careful soldering, and a bit of super glue, he’s left with a perfectly good wall charger. He can charge most things that only use the juice from the wall. Some things refuse to charge though, such as Zunes. There was another project by [Cvesey] that claims to charge Zunes as well. While wall chargers may be available fairly cheaply now, many of us have some of these cellphone chargers just sitting around. Now we have a use for them.

Iphone-dev Team Progress Update


The iphone-dev team hasn’t been resting on their laurels since releasing the iPhone Pwnage Tool 2.0 nearly two weeks ago and decided to update everyone on their progress. Despite the iPhone 2.0 jailbreak, there still isn’t a way to unlock a 3G phone. They’ve managed to do other things like downgrade a 3G to an older baseband firmware, which demonstrates their ability to bypass security checks and run unsigned code on the baseband. A nice side effect of all the downgrade work is that they’ve perfected the percautions they take to prevent bricking. The team has been following threads about using SIM proxy devices for unlocks as well, but concluded that the devices are a kludge at best and reliability can vary wildly depending on the phone’s location. They also pointed out the fine work that RiP Dev has been doing on Installer 4 which will help you install software that isn’t from the AppStore.

Essential Bluetooth Hacking Tools

Security-Hacks has a great roundup of essential Bluetooth hacking tools. As they point out, Bluetooth technology is very useful for communication with mobile devices. However, it is also vulnerable to privacy and security invasions. Learning the ins and outs of these tools will allow you to familiarize yourself with Bluetooth vulnerabilities and strengths, and enable you to protect yourself from attackers. The list is separated into two parts – tools to detect Bluetooth devices, and tools to hack into Bluetooth devices. Check out BlueScanner, which will detect Bluetooth-enabled devices, and will extract as much information as possible from those devices. Other great tools to explore include BTCrawler, which scans for Windows Mobile devices, or Bluediving, which is a Bluetooth penetration suite, and offers some unique features like the ability to spoof Bluetooth addresses, and an L2CAP packet generator. Most of the tools are available for use with Linux platforms, but there are a few you can also use with Windows.

[via Digg]

Teenager Invents Vehicular Antitheft System

We are very inspired by the story of [Morris Mbetsa], an 18-year-old Kenyan who’s invented the “Block & Track”, an antitheft and tracking system for vehicles that’s phone-based. [Mbetsa] has no formal training, but he’s been a lifelong inventor and tinkerer. [Mbetsa] combined voice, DTMF, and SMS text messaging technologies with cellphone based services to allow the owner to control the vehicle’s electrical system remotely. The owner, using his cellphone, can take control of the ignition, and disable it at any time. Other features include the ability to lock the car remotely, and the capability of dialing into the car and listening in on any conversations taking place within the vehicle. [Mbetsa] is currently looking for funding to take his invention to the next level; we’re eager to see what he’ll come up with next.

[via Digg]

Honeybike: Bicycle Thief Honeypot


[liseman] decided to build a honeypot for bicycle thieves. He mounted a pay as you go cell phone and a gutted stun gun inside a water bottle. When the phone is dialed, the stun gun is activated thanks to a tap on the vibration motor inside the phone. He also installed some tracking software on the phone so the bike can be traced when stolen.
Location of the stun gun probes depends on certain assumptions: will the thief ride off on the bike, or simply toss it in the back of a truck. (Check your local laws if you’re contemplating doing this yourself.)