Feeds

iPhone jailbreak tools updated to open firmware 1.1.4

ZiPhone, iNdependence tweaked

Secure remote control for conventional and virtual desktops

The latest version of iPhone activation, jailbreaking and unlocking tool, ZiPhone, has been released. The tool promises full access to Apple's handset in under five minutes.

The update, which takes ZiPhone to version 2.5 in its command line, Windows and Mac OS X forms, follows Apple's release earlier this week of version 1.1.4 of the iPhone firmware.

Having taken our iPhone last week from firmware 1.0.2 to 1.1.3, we've just run the 1.1.4 update - ZiPhone coder Zibri recommends restoring the handset's firmware to 1.1.4 rather than simply clicking iTunes update button - followed by ZiPhone 2.5.

After the restore, we had the handset activated, jailbroken - ready to run third-party apps, in other words - and unlocked in about four-and-a-half minutes.

We'd recommend that iPhone users who've been waiting to update to 1.1.4 sync their handset with iTunes first to preserve settings. Restoring the OS will erase any third-party apps you've installed, but ZiPhone auto-loads the Installer app, so reacquiring these isn't hard.

iPhone 1.1.4 is described by Apple simply as a "bug fix". Anecdotal evidence suggests the update improves the handset's signal pick-up, fixes a multi-recipient SMS message display order glitch and solves problems 1.1.3 had with some Bluetooth devices.

The release of ZiPhone 2.5 comes after coder The Operator updated Mac unlocking tool iNdependence to version 1.4b5, again to support firmware 1.1.4.

Special Report: Unlocking the iPhone for pleasure and profit... revisited

Internet Security Threat Report 2014

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.