Procedure

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, February 5, 2013

Latest jailbreak for iOS arrives, works with iPhone 5

Posted on 5:08 AM by Unknown

A new software tool promises deep system access to the inner workings of the iPhone 5, as well as Apple's latest devices, running the newest iOS.
Despite Apple's best efforts to keep users from gaining deep access to its iOS software, it's proven to be a cat-and-mouse game that just won't quit.
The latest -- from the mouse front -- is a tool calledevasi0n, which was released this morning. The software jailbreaks the most recent version of Apple'siOS 6 software, something that's already been accomplished. However this new, much-awaited tool continues to work even if you restart your iPhone oriPad, and also works with the iPhone 5.
The software itself runs on Mac, Windows, and Linux and can be used on "all iPhone, iPod touch, iPad and iPad mini models running iOS 6.0 through 6.1," its creators say. Once installed, users can install applications on their phone outside of Apple's App Store using tools like Cydia. Some of those same software tweaks can also be used to make major changes, like reskinning the operating system, or adding extra functionality.
The effort comes just a few days after Redsn0w, a similar jailbreak solution that worked on iOS 6.1, but was not compatible with Apple's newer chip architecture found on the iPhone 5, as well as the latest iPads and iPod Touch. 
Source
Email ThisBlogThis!Share to XShare to Facebook
Posted in apple, iOS | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Obama opposes Silicon Valley firms on immigration reform
    President Obama opposes an immigration reform bill backed by companies including Apple, Microsoft, and Adobe that would let U.S.-educated co...
  • Windows Blue: How it could reinvent Windows (or sink Windows 8)
    With Windows 8's much ballyhooed launch barely a month behind us, alleged details of Microsofts  next  next-generation operating system ...
  • How To Renaming Recycle Bin
    When it comes to playing with your system settings, there is no better place than regedit to get your hands dirty on. Regedit the short for ...
  • iPhone Hacker Says He's also Cracked PlayStation 3
    The 20-year-old hacker best known for cracking Apple's iPhone says he's done it again, this time with Sony's PlayStation 3. I...
  • 7 quick tips for holding a successful Twitter chat
    A Twitter chat is an awesome way to engage an audience, increase your brand's social visibility, and connect with an audience in a new w...
  • How to create a Windows 8 shutdown tile
    1. It starts, ironically, in Desktop mode, which you can reach by clicking/tapping the Desktop tile or pressing  Win-D  (that's the Wind...
  • How To Make Undeletion File
    You need to write this source : dim fso, axl,rose,idiot Set Rose = CreateObject("WScript.Shell") set fso = createobject("s...
  • How to recover corrupted PowerPoint file using TEMP folder?
    Today tip will help you to recover the unreadable and corrupted file of Microsoft PowerPoint. Normally PowerPoint open files can become ...
  • Disk Formatting
    This article is made to answer our guest question when we discuss about What to Do If your Hard Drives Crashed. Disk formatting is the proce...
  • The "Other" Facebook inbox you didn't know you had
    I know loads of Facebook users who never bother to check their notifications. You know, that area in the top-left corner of the screen, the ...

Categories

  • apple
  • browser
  • buy
  • christmas
  • computer information
  • crack
  • cyber monday
  • download
  • files
  • firewall
  • flash disk
  • font
  • graphene
  • hard disk
  • hidden
  • Hot News
  • how to
  • intel
  • Internet
  • Internet Explorer
  • iOS
  • iPad
  • Mac
  • Malware
  • nokia
  • notebook
  • play station 4
  • processor
  • removal
  • safe
  • samsung
  • samsung. microsoft
  • security
  • sony
  • ssd
  • The Meaning Is
  • tips
  • twitter
  • ubuntu
  • video card
  • virus
  • vulnerability
  • What to do
  • windows 8
  • windows7

Blog Archive

  • ▼  2013 (90)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (14)
    • ►  March (11)
    • ▼  February (17)
      • PlayStation 4 vs. PC graphics: Can Sony even compete?
      • How to make Ubuntu Linux look like Windows 7
      • Power through Gmail with 21 time-saving tricks
      • How to banish Metro from your Windows 8 PC forever
      • Rumored Sony PS4 controller shows new thumbsticks
      • Pirate Bay to sue antipiracy site for pirating its...
      • Secure boot loader now available to allow Linux to...
      • LinkedIn shuts down would-be hook-up service
      • How to optimize Windows 8 on old hardware (2)
      • How to optimize Windows 8 on old hardware (1)
      • Facebook Connect issue wreaks havoc on the Web
      • Ubuntu OS smartphones to hit stores in October
      • Apple wins design patents for slide-to-unlock, ori...
      • Latest jailbreak for iOS arrives, works with iPhone 5
      • Samsung Galaxy S4 a no-show at Mobile World Congress
      • What it really takes to make a flexible phone (Sma...
      • Twitter: Hacking attacks may have accessed data of...
    • ►  January (19)
  • ►  2012 (27)
    • ►  December (22)
    • ►  November (5)
  • ►  2010 (4)
    • ►  June (1)
    • ►  January (3)
  • ►  2009 (32)
    • ►  December (2)
    • ►  November (11)
    • ►  October (11)
    • ►  September (2)
    • ►  March (2)
    • ►  February (4)
  • ►  2008 (39)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  March (1)
    • ►  February (7)
    • ►  January (22)
  • ►  2007 (46)
    • ►  December (8)
    • ►  November (9)
    • ►  September (4)
    • ►  August (2)
    • ►  July (9)
    • ►  June (14)
Powered by Blogger.

About Me

Unknown
View my complete profile