Sunday 8 January 2012

Jailbreak iOS 5.0.1 Untethered On iPhone, iPad, iPod touch (A4 Devices) Now Using Redsn0w 0.9.10b3 / Corona

It has been nearly eight weeks since the first declaration by pod2g that he had found a bug that he believed could provide an untethered jailbreak for iOS 5. We find ourselves exactly fifty days down the line, and what I imagine has been a lot of sleepless nights for the developers involved, but we now officially have the release of an untethered jailbreak for all A4 devices running iOS 5.0.1.

Step 1: Download and install the new iTunes 10.5 on your Windows PC or Mac. Connect your iOS device with your computer and make sure you make a backup of everything.
NOTE: Those of you who rely on Gevey SIM or Ultrasn0w unlock should skip to “For Unlockers Only” section found at the bottom.
Step 2: Now upgrade your iOS device to the final version of iOS 5 using iTunes 10.5 on your Windows PC or Mac. Download links for final version of iOS 5 can be found here.
Step 3: Download the new Redsn0w for Mac or Windows.


On December 22nd, pod2g announced via his official blog that would be passing all of his work and details across to the researchers at the Chronic Development Team partly to allow him to concentrate on progressing the development of an A5 jailbreak, and partly because he believed that the Chronic Dev Team could integrate and package all of his work into a distributable jailbreak.
It seems that his instincts were correct as only five days after that decision was made, we are seeing a release of a jailbreak for A4 devices on iOS 5.0.1 which has been implemented by both the Chronic Dev  and iPhone Dev teams.
The iOS 5.0.1 untethered jailbreak contains the exact same set of files that pod2g provided to the Chronic Dev Team, and can be distributed as either a download via Cydia by searching for a package named ‘Corona’, for users who are already jailbroken tethered, or through a Redsn0w bundle for users who have running stock iOS and have been waiting for this untether.
At the time of writing, it is worth noting that this jailbreak currently only supports iOS 5.0.1 with Chronic Dev Team member p0sixninja tweeting out that 5.0 will follow soon after a number of small bugs have been eradicated and more testing has been carried out. Pod2g has also released some advice to A4 and A5 users advising not to update their devices to iOS 5.0.2 or 5.1 when released as this would cut their chance of a future jailbreak.
Note: The jailbreak released is supported on all A4 based (and below) devices like iPhone 4, 3GS, iPod touch 3G/4G and iPad 1. Newer A5-based devices like iPad 2 and iPhone 4S are currently not supported.
For Users On iOS 5.0.1 Tethered Jailbreak:
If you are currently operating an A4 device which has a tethered jailbreak using Redsn0w, Ac1dSn0w or Sn0wbreeze then you can simply launch Cydia from your Springboard and download a package named ‘Corona’ which will provide you with an untethered jailbreak.

For Users On Stock iOS 5.0.1:
If your device is running stock iOS 5.0.1 then you can use download the latest Redsn0w 0.9.10b1 to for either Windows or Mac to give yourself an untethered jailbreak, instructions for which can be found below.

Step 1: Download the latest version of Redsn0w from the links given above.
Step 2: Start Redsn0w, select "Jailbreak" then check "Install Cydia". Follow the onscreen steps to place your device into DFU mode.
Step 3: Wait for Redsn0w to apply the full untethered jailbreak!
Once done, your iPhone, iPad or iPod touch will be rebooted into fully untethered jailbreak mode!

iPhone 4 GSM, jailbroken on iOS 5.0.1
For Users Who Rely On Unlock:
For those of you who rely on Ultrasn0w or Gevey SIM unlock must preserve the old baseband using “Custom IPSW” option found in Redsn0w.


Saturday 7 January 2012

Download Adobe Acrobat X Pro 10(PDF editor, edit PDF)-Cracked

 Download

Fileserve

 

What is Acrobat X Pro?

Adobe® Acrobat® X Pro software lets you deliver highly professional PDF communications. Create and edit PDF files with rich media included, share information more securely, and gather team feedback more efficiently.


Top benefits of Acrobat X Pro

 

Increase your productivity

Increase your productivity

Get more work done — faster. From streamlining routine PDF tasks to quickly comparing two files, Acrobat X Pro software makes your job easier.

Learn how customers are increasing their productivity ›
Protect sensitive information

Protect sensitive information

Share files with confidence by easily adding PDF passwords or digital signatures. Remove sensitive information with redaction tools.


Learn more about digital signatures ›

Easily create fillable forms

Easily create fillable forms

Turn your paper forms into fillable PDF forms in just a few steps. Distribute and collect forms electronically, track status, and analyze results.

Learn more about fillable PDF forms ›
Share multiple materials in one file

Share multiple materials in one file

Make a stronger impact by organizing a wide range of content types in a single, polished PDF Portfolio virtually anyone can view.


Learn more about PDF Portfolios ›




Android Vs. iOS – How Secure Are They?

 

It seems like a technological version of Top Trumps, with the two biggest mobile operating systems going head to head, battling each other on a topic which is of the utmost important in this day and age when we all consume and handle so much sensitive data – security! When new Apple CEO Tim Cook took the stage in October of last year for iPhone 4S keynote, he took the opportunity to slip in a few statistics relating to the worldwide adoption of iOS devices.

iOS-5-ICS
He revealed that the Cupertino based company had sold more than 250 million iOS devices since the launch of the original iPhone in 2007. As iOS is the operating system which powers Apple’s portable units, we can only assume that the quarter of a billion figure covers iPhones, iPads, iPod touches and the second generation Apple TV. On the other side of the fence sits Android, the operating system supplied to the masses by Google. Their Chief Executive Officer, Larry Page, also announced that they had flicked the switch on just over 190 million Android activations, with Google preferring to call it that as opposed to sales. In most cases, and certainly in this instance, the statistics don’t lie, but then they don’t always paint a fair comparison either considering iOS had a full sixteen months head start on Android. The other important factor to look at when comparing the numbers, is that Apple only includes iOS on a small number of devices whereas Android is used to power literally hundreds of different gadgets so I think it is fair to say that in terms of worldwide adoption, iOS is still dominant, at least for now.
But just how do the two operating systems compare against each from a security point of view? Security research firm Veracode have produced an very interesting infographic which highlights some of the more important and interesting comparisons.
First of all let’s start at the similarities with both platforms, and the security features which they both share. Android and iOS both have what is known as traditional access control, basically the method in which users get access to the device and put the device to sleep or lock it. They both also have access control settings to add or remove permissions for applications, meaning users can limit an applications ability to access certain services or data. Something which was surprising to me, was the limited access to the hardware which the two operating systems have. Both platforms contain a number of layers of intermediary software which acts as a go between for the OS and the underlying hardware. Finally, both iOS and Android have built in contingencies to resist web based attacks, should they occur.
One area of public debate is the methods of distribution for applications. Android users often slate Apple for the draconian rule it has over developers and the method in which applications are submitted. All developers must submit a binary package to Apple for their team of engineers to inspect and approve for App Store distribution. This can result in longer wait times before publication, and in some instances can result in rejection and the failure to reach the App Store. Android on the other hand has many more avenues available to developers with the platform being able to support more than one application market and the mass distribution of over the air applications being an option. However, it isn’t uncommon for Apple to approve an application for sale, only to then decide it breaks one of their rules and subsequently remove it without warning.
So now we move onto the strengths and weaknesses of both of the OSes. Both devices operate with permission based access control systems in place, as mentioned earlier on. However, the two models approach this from a different angle. As an example, if a user is using an application that requires the use of their location, the app is required to provide an on screen alert requesting permission to access the users current location. If that user denies the request, and the application is dependent on actually receiving the green light, then the app can fail and be rendered totally useless. On the other side is Android’s model which presents the user with a list of the applications permission requirements at the point of downloading. The user must then decided to proceed with the download and ‘grant’ permission.
Two quite important security features within iOS are the Geo-location and auto erase abilities. If you are struggling to imagine these in a real world scenario, just think of the Find My iPhone application provided free of charge by Apple. The app allows users to locate a lost device should the need arise, and then remotely wipe all of the data on that device. If that isn’t possible, the data will automatically be wiped if the device has slipped into the wrong hands and that person enters the passcode pin code wrong ten times.
And what about weaknesses? Well both platforms have plenty, but then doesn’t most software? An example cited in the infographic is the vulnerability of Apple devices running a version of iOS lower than 4.3.5 to a SSL MITM, or man in the middle attack which hackers can exploit with little effort. This is particularly important due to the fact that certain Apple devices are not actually permitted to upgrade to a higher firmware due to their age and therefore will always remain susceptible. The same update issue is relevant to Android devices, as millions of devices that are still under contract cannot be updated to the latest version of the OS. Android also suffers from a marketplace which is the equivalent of a warzone. The Android Market has a minuscule amount of security in place, and Google allows pretty much any application to be submitted to the market for sale or download. Unlike Apple, Google does not check the security or validity of any applications prior to them going up for sale.
The infographic contains other very interesting bits of information so make sure to thoroughly check it out, and read the smartphone tips included to protect you and your device. On a more positive note, leading security company Symantec concede that although both devices have their security vulnerabilities they both offer a substantial higher level of security than their PC counterparts.
ios-android