PC Monitor Sleep Mode Using IPhone

[Mike Silverman] rigged up a way to make his monitor sleep from an iPhone. Working with a Windows system, he installed QuickPHP and NirCmd to add PHP and command line controls. Some quick PHP code writing and this has the effect of creating a sleep button toggled via a network address. He loads up the IP and port information in the Safari browser of his iPhone, creating a Home Screen short cut seen in the image above. Now he clicks on the button and puts the screen to sleep.

It’s not that we find this functionality useful since most monitors sleep after a few minutes of inactivity. But we like the methodology and you can bet we’re already planning uses for this. Any PHP server (like the copy of Apache running on this machine) will do as long as it’s on the same LAN as the iPhone’s WiFi connection.

Android On IPhone: New Treats

It seems that the iPhone 2g and 3g are the newest phones to get Android 2.2, codenamed Froyo. The process for installing Froyo if you have a jailbroken device seems to get even easier every time, with this revision being as simple as adding a repository, downloading Froyo, and pressing go. Follow the link for a wonderful step by step guide, complete with screenshots to take out all of the guess work. Android on iPhone sure has come a long way since the first time we covered it.

[via reddit]

Security Flaw Bypasses IPhone Lock Screen

It looks like the iPhone lock screen provides just a marginal level of protection. [Jordand321] discovered a key combination that opens the contact app on a locked iPhone. Just tap the emergency call button, enter the pound sign three times (###), then tap call and immediately tap the lock key on the top of the phone. If this is confusing just look at the video after the break to see how it’s done.

You don’t get access to everything on the device. But this does give an attacker access to all of your contact data and allows that person to make any calls they desire.

Continue reading “Security Flaw Bypasses IPhone Lock Screen”

New A4 Jailbreak Debacle Puts The Brakes On For IPad

If you’ve been waiting in the wings for the next Jailbreak to be release you should know there’s been a bit of a speed bump. [ChronicDevTeam], which has been working on an exploit for A4-based iOS devices called SHAtter, tweeted last Thursday that the fully tested, untethered, and unpatchable package knows as greenpois0n would be released today. But on Friday [Geohot], who you may remember from the PlayStation 3 Hypervisor exploit, rolled out his own mostly untested and admittedly beta jailbreak called limera1n.

So where does that leave the situation? Because [geohot] used a different exploit, the [ChronicDevTeam] decided not to release greenp0ison. If they did, it would give Apple a chance to block two different exploits. Instead they are working feverishly to incorporate, test, and repackage using the same exploit as limera1n.

If you don’t want to wait, jailbreak now, but you risk problems with an unstable exploit method that is only available for Windows.

[via @ChronicDevTeam]

IPhone Drum Machine Isn’t Synthesized

There was a time when a drummer would grab some sticks and lay out a groove using the items around him as instruments. [Lsa Wilson] would rather not work quite that hard and has chosen to do the same thing by tapping on an iPhone screen. As you can see in the clip after the break, many of the items in the room around him have been fitted with solenoids. Each is connected to an Arduino which is then controlled by Open Sound Control and interfaced with the iPhone via TouchOSC. We love the sounds being created and can’t help being reminded of the Multixylophoniomnibus.

Hexapod Controlled By Android And IPhone

[youtube=http://www.youtube.com/watch?v=NvEBUd_EqbQ]

This video is a blatant example of having too many high-end toys but we love it anyway. [Robert Stephenson] is controlling a rather awesome-looking hexapod via a Bluetooth connection to his HTC Hero. The app allows on-screen selections to decide which portion of the robot will move as a result of accelerometer data from the handheld. The only thing we saw that was missing is a camera feed to the phone.

But this hack doesn’t stop there. The Hero can be used to host a WiFi network while still connected to the hexapod. The second half of the video shows an iPod Touch connecting via WiFi and controlling the bot. Now head on over to the laser cutter to start that hexapod build, and finish up by getting elbow-deep into some Android development.

Make IPhone A Penetration Testing Tool

[Nicholas Petty] has posted a guide to setting up your iPhone as a penetration tester. You already carry it around with you and, although not too beefy, it does have the hardware you need to get the job done. So if you’re not interested in building a drone or carrying around a boxy access point try this out. The first step is to jailbreak your device and setup OpenSSH so that you can tunnel in for the rest of the setup. From there the rest of the setup is just acquiring build tools and compiling pentesting programs like Aircrack-ng, Ettercap, Nikto2, and the Social Engineering Toolkit. You’ll be up to no good testing your wireless security in no time.