Paper is quickly becoming a thing of the past, so we’re offering you a three-year digital subscription to Hacker Monthly that you can enjoy on any device you want (PDF, MOBI, EPUB format), DRM-free for the price of just one year. Plus, you get access to all current and past issues immediately after your purchase.
All items tagged with "hacking"
T-Mobile finally has the iPhone 5. It’s great, and cheap, but unfortunately its data speeds are slower than an iPhone 5 on AT&T. Not satisfied with their slower iPhone 5s, Joseph Brown and Sky Zangas did some digging around in carrier update files and figured out a way to boost data speeds on the T-Mobile iPhone 5.
To get faster data speeds on T-Mobile’s network with the iPhone 5 all you have to do is install a custom carrier update. That sounds like a tough task, but it’s actually pretty easy, and thanks to the guys at TmoNews, here’s a quick guide on how to do it:
Back in 2010, a team of hackers who went under the group handle Goatse Security exploited a hole in AT&T’s website to steal over a hundred thousand iPad subscribers’ email addresses.
The first of the pair, Daniel Spitlier, plead guilty to the attack back in 2011, bringing him a 12-18 month maximum sentence.
His partner, though, hasn’t gotten off nearly as easily: Andrew ‘weev’ Auernheimer has just been sentenced to forty-one months.
Last week we asked you guys to show us just how amazing you can make your iPhone look with tweaks and hacks for the homescreen and lockscreen, and boy were we impressed. We received over 100 entries in the jailbreaking contest and pretty much all of them were spectacular.
To celebrate the launch of our new Flickr and Instagram groups, we’re giving the 10 best jailbreak screens a free copy of Kuvva Wallpapers. After some serious deliberation, we think we’ve got some drool-worthy winners.
Here are the 10 most amazing jailbreak screens:
It’s only been a few weeks since the first lockscreen hack was discovered on iOS 6.1, but some researchers have already discovered a new way to bypass the iPhone’s lockscreen without entering the security PIN.
The bug was found in iOS 6.1 by Benjamin Kunx Mejri, and it follows some of the steps as the last exploit but has some variation in the steps, and it allows an attacker to access all your data by plugging your device into a computer’s USB port.
Earlier today it was reported that Apple’s computers had been compromised by a zero-day exploit in Java. Apple quickly released an update to patch the flaw for all Macs, but not before some of its own employees had been hacked.
The hack in question affected more than just Apple; Silicon Valley giants like Facebook and Twitter were also compromised. How exactly were hackers able to gain access to some of the biggest tech companies’ computers? The source is a single web forum for iPhone development.
Terminal app can be daunting at first, but it’s really the best way to hack into your Mac’s configurations and preferences to customize things to work for you rather than against you. With the right Terminal commands, you can tweak the Finder, mess with the user interface, build a more private and secure Mac, and even enable features that aren’t officially supported on older Macs.
Here are a few of the better ones.
Ah, the venerable old Macintosh Portable. First introduced in 1989, the $6,500 wasn’t just a milestone in that it was the first battery-powered portable Mac, but it was also the first laptop ever used to send an email in space.
I’ve always been fond of the cute, suitcase-y design of the Portable Macintosh, so I’m delighted to see that some industrious hacker has given it a new life by gutting it and transplanting the innards of a Toshiba NB100 netbook inside. Some truly advanced soldering later, and you have, for all appearances, a pristine Macintosh Portable that can also run OS X Mountain Lion.
Check out this full video tour…
Back in 2007, Steve Jobs used a famous quote from ice hockey player Wayne Gretzky to summarize Apple’s commitment to innovation: “I skate to where the puck is going to be, not where it has been.” That’s long been true for Apple and products like the iPhone and iPad. But for more than four years, jailbeaking has pushed the boundaries of iOS even farther.
If Apple skates to where the puck is going to be, then jailbreakers have usually already been there and left. The hackers and tinkerers that find security loopholes in Apple’s software are some of the most brilliant, innovative minds in the tech world.
We’ll be covering JailbreakCon 2012 this weekend in San Francisco, the world’s first convention dedicated solely to the jailbreak community. What better way to get ready for the future of jailbreaking than to examine the past? Let’s start from the beginning:
An old-as-the-hills Easter Egg has been rediscovered by New York based hacker collective NYC Resistor: hidden pictures of the Macintosh team from 1986 hidden in the Mac SE’s system ROM. The Easter Egg has been known about forever — references to it on the Internet go back to at least 1999 — but more interesting than the Easter Egg itself is how NYC Resistor discovered for themselves how it was done: by good, old fashioned hacking.