Monday, July 27, 2009

Cydia-Saurik’s Letter to the US Copyright Office about Apple seeking to Ban Jailbreak

February 22nd, 2009.



Commenter: Jay Freeman (saurik)
Title: Member
Organization: SaurikIT, LLC
Proposed Classes: 5A
Class Disposition: Supporting

Computer programs that enable wireless telephone handsets to execute lawfully obtained software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the telephone handset.

Hello. I am the developer of Cydia, the first application installed onto Apple’s devices after they have been jailbroken. Cydia acts as an open competitor to the Apple App Store: anyone can put applications up. These applications are distributed from any number of “repositories”: anyone can run one, and end users can add them to their copy of Cydia. In this manner, Cydia acts as a web browser: no one has centralized control over what can and cannot be distributed.

All of this is, itself, based on an existing “industry standard” known as APT: an “open source” mechanism for distributing applications that has been in use by computer operating systems such as Linux for well over a decade. Even Cydia is open source: anyone can get access to its source code in order to either understand or modify it.

Cydia is now installed on 1.6 million devices worldwide, at least a quarter of which are within the United States. Please note that this number is not based on download counts or “unique IP addresses”, both of which drastically overestimate the number of users an application has. This number is based on a survey of unique device identifiers (a mechanism that Apple encourages developers to use to track devices) over the last month.

These users are also quite active: 300,000 unique devices check in to Cydia each day, over 650,000 each week. This takes the form of people looking for new packages, new repositories, and getting upgrades. What these users are coming back for are the hundreds of applications that are in Cydia, each one of which being of the type Apple denies from their store.

Unfortunately, there is now concern that applications that jailbreak phones, the tools that people use to install Cydia, may come under attack from Apple under the DMCA. This is /terribly/ unfortunate as there is a thriving market of applications for these “jailbroken” devices.

Apple isn’t even the only problem. An entire new class of devices is coming onto the market, a class of devices that I do not feel currently has a good name, but for which I will temporarily call “integrated computers”. These devices really are computers: they are running the same operating systems that we find on everything from laptops through desktop computers up to massive computation clusters.

In Apple’s case, this operating system is Darwin, the base of their Mac OS X desktop operating system. In the case of the new Android phones, this is Linux, an increasingly popular “free software” kernel.

There is nothing intrinsically restricted about these devices, and nothing that requires them to have restrictions: nothing except the controlling attitudes of the people who are releasing them. The T-Mobile G1 from HTC, running the touted “open source” Android, is not able to be changed by end users using the code that Google is trying to give us.

Back to Apple’s devices, they maintain tight encryption-backed control over what applications users can install onto their devices. Apple uses this control in order to explicitely act in an anticompetive manner: denying applications that provide similar functionality to those applications that Apple distributes with their device as “it may cause user confusion”. With this, they have managed to keep Opera (the most popular mobile web browser provider) from even bothering to attempt to target their system. They have publically shut down Sun from bringing in Java (which would itself compete with their App Store due to their J2ME technology), and only after a couple years been willing to sit down and work with Macromedia to bring Flash to their platform.

They have denied competing mail applications, competing camera applications, and competing mapping systems. They also have exerted control over what they feel to be acceptable content, sometimes vascilating (first denying any application using the word “fart”, and then allowing one in which rapidly becomes the #1 most popular application in the store).

This has led many developers to “go underground”, distibuting their products using Cydia, and selling it from their own websites. As an example of some of these applications, I will describe a few of the programs I have written, and why users want them:

Cycorder – This application allows users to record videos with their iPhone’s camera and transfer them to a computer. Cycorder is one of the “killer applications” of jailbroken iPhones, and is used by a very large percentage of its users. I do not know how many, but even four months ago I estimated hundreds of thousands.

These videos themselves have become quite widespread, and have even been aired on CNN’s iReport (where users can contribute videos to get aired on the network) [1]. One user even shot a music video using it [2].

1: http://www.ireport.com/docs/DOC-103642
2: http://www.goshone.com/?p=74

Unfortunately, Cycorder (and a few applications like them, such as Qik and Video Recorder 3G) have been submitted to Apple and then ignored for months. These applications require access to the camera, which Apple does not allow as part of their official SDK: while applications can let the user take a picture, it is tightly managed by an interface that Apple has provided.

WinterBoard – An “extension” for the system that allows users to customize the graphics and sounds on their device. One feature that almost every cell phone on the market has is the ability to change the wallpaper, much as one would on a desktop computer. However, this is not functionality available on the iPhone: “any background you want, as long as it’s black” (as Henry Ford may have said).

There are now thousands of “themes” available: sets of graphics. These themes don’t just change the wallpaper: they use WinterBoard’s full features in order to theme the entire system, changing all of the icons, the buttons, and the entire feel. Users install these themes using Cydia and then activate them using WinterBoard.

Unfortunately, WinterBoard requires access to system files that Apple has protected. For the full amount of control it provides to the user, it needs to “inject” or “hook” into every running application, in order to change the loaded graphics. This level of functionality is definitely verboten.

Veency – Another extension that allows users to remote control their iPhone using a compter monitor and keyboard. Veency is very popular among developers giving presentations of their work, but also has been used by people to make writing text messages easier (using their computer keyboards). This is of incredible value to the users who use it, although it is not as popular as other applications in Cydia. It is open source.

Currently, Apple provides no mechanism for recording the screen of the device, which means that users who want to show off their applications either have to use a simulator (which does not let them interact with the screen in intuitive manners with multiple fingers), or setup a physical camera to record their screen and project it onto a wall. Neither of these are usable solutions for many presenters.

Unfortunately, getting direct access to the display buffer requires access to APIs that Apple does not allow usage of in the App Store. Also, this requires a “daemon”: a program running in the background, to accept the incoming screensharing requests. Apple also does not allow background programs on their devices.

Obviously, though, I am not the only developer who has been working on this device. There are numerous companies that have managed to make a market selling products for jailbroken iPhones. Some examples:

SpoofApp – voice changing, call recording
MCleaner – block incoming calls and sms
iBlackList – another call blocking application
Cylay – track iPhone, theft protection
MiVTones – video ringtones for incoming calls
iPhone Modem – laptop/iPhone data tethering
PDANet – another tethering application

To bring a specific example to the forefront, I will focus on Snapture, distributed by Snapture Labs, LLC. Snapture is an improved Camera application for the iPhone. Snapture is denied from the App Store for similar reasons to Cycorder. Snapture, however, does not concentrate on videos: it is about better still photos.

Unlike most point-and-click cameras, the iPhone does not support numerous “standard” features, such as timed pictures, color tinting, image rotating and zooming, and photo bracketing. Snapture provides all of these features, and is sold for $7.99 from their website [1].

What makes Snapture even more interesting is that they are also providing a hardware component to go with their product: the SnaptureFlash [2]. This is an attachment for the iPhone that provides a strong Xenon LED Flash/Light in order to make taking pictures in the dark even easier. Unfortunately, Apple does not provide access to the hardware connector to App Store developers: this is a hardware component that could only ever work with jailbroken phones.

1: http://www.snapturelabs.com/
2: http://www.snapturelabs.com/snaptureflash.html

I therefore am going to close this (partly because I am running out of time), with a plea to the copyright office to not ignore the many hundreds of thousands of earnest users: users who are legally purchasing alternative applications and wishing to use them on their iPhones and iPod Touches, users who want functionality from their mobile devices that often no one is able to provide, but which is now possible on these new classes of devices. If only the people who were distributing these devices were fully open.

Sincerely,
Jay Freeman (saurik)

RedPwn [Jailbreak OS 3.0 - Windows]



A new tool [ RedPwn ] similar to QuickPwn was released to jailbreak OS 3.0 on Windows Only.

RedPwn has an upperhand over other jailbreaking tools as it allows you to jailbreak your device ( iPhones 2G and 3G and iPod Touch 1G and 2G ) as well as directly install software like SBSettings, WinterBoard, iFile, LogoMe, Safari DL Plugin and cycorder!!! It also has an option to Unlock the 3G which no other jailbreaking tool has ever had.

Also, its very simple to use.

NOTES:

* Make sure you have “See jailbreak Proccess” checked or you will run into problems.
* To get it in English, click the arrow beside the globe in the Left Bottom Corner By Status!

Just make sure you have iTunes 8.2 installed and run RedPwn.
Follow the onscreen instructions and in no time you’ll be officially jailbroken

Download Link 1

Download Link 2

Sunday, July 26, 2009

False history of india propagated by britishers



ARYAN INVASION THEORY.
One of the most controversial ideas about Hindu History is the Aryan invasion theory.

download

Michael Jackson-TributeLegend




Michael Joseph Jackson dubbed the "King of Pop", was an American musician and one of the most commercially successful entertainers of all time. His unique contributions to music and dance, along with a highly publicized personal life, made him a prominent figure in popular culture for four decades.

I am uploading a PDF file which i got from different source on internet.
which shows us MJ so Near.
Hope you guys will like it.

Download

Wednesday, July 22, 2009

Publishing on the App Store or distributing apps in-house




In this section we'll list things related to publishing your apps on the App Store or getting your apps onto iPhones within your company. Regardless of the methods you use, you must become a "paid" developer to move your apps to any device whatsoever. "Registered" developers who can download the development tools for free can only run their apps on the Xcode iPhone Simulator.

Apple clearly explains all the steps involved with publishing on the App Store once you become a paid (enrolled) developer. In summary, here are the highlights of what's involved once you do...

* Determine if you are going to be selling apps through the App Store as an individual or a company, or as an enterprise developer who will only be distributing apps within the enterprise. As an individual or company, your legal name or legal company name (e.g. sole proprietor, LLC, corporation, etc) will appear as the author of your apps on the App Store.

Once you become a paid developer you'll be given access to iTunes Connect. You should immediately start setting up the "seller" information before your app is finished.

Note that if you plan to sell apps as a company you'll want to have already established your company's identity completely before you first set up your seller information. Be warned that it can take a few weeks or more to change your seller status later and it can become very messy if you have apps already in the app store sold under an individual license and then try to change it later to a company license.

In the US, you'll want to set up a bank account exclusively for iPhone revenue, and provide your Social Security Number as an individual or your IRS EIN for your company. You will be asked to fax documentation of proof of your company's identity. This process could take a week or so.

* Download the iTunes Connect Developer Guide PDF. This document clearly explains everything you will need to know and all the steps involved in submitting apps to the App Store, as well as specifications for submitting graphics and your iTunes page information, etc. In addition, there is a video paid developers have access to called "Selling on the App Store" which provides and overview of the process. A new and updated video which also covers handing in-app purchases was released to WWDC attendees and Apple will probably be making an updated video available soon. This video details how you use the facilities of iTunes Connect to test your in-app purchasing (if you use it) in a "sandbox" to make sure it works as you expect before releasing it on the App Store.

* If you are going to be creating apps for private in-house use, you sign up as an enterprise developer. You can distribute your apps with the "ad hoc" method where you get the UDIDs of up to 200 devices and register them in the "Program Portal" area allowing you to distribute apps which can only be used on those devices, for example in a college course situation. Alternatively you can distribute to any number of iPhones in your organization without recording their UDIDs by creating a provisioning profile which will be loaded onto your company's iPhones, and then your distributed (signed) apps will work on those phones only.

In either case, you can distribute your in-house apps either via email or posting them on a private website, but regardless they have to be downloaded onto a Mac or PC's desktop (they can't be emailed to the device, for instance). From there the apps can be drag-and-dropped onto iTunes and then synced to the device, or you can also use a free utility from Apple to move the app to the device if you don't want your employees using iTunes.

More information can be found in the Tech Talk World Tour video "In-House Development for iPhone" or the WWDC '09 Session 603 video "In-House App Development for iPhone" and both provide the same information.



Major things that will result in rejection of an app submitted to the App Store

* Use of Apple's private (unofficial) APIs, or perhaps other APIs. You can include C and C++ code libraries of your own.
* Any attempt to go where you aren't supposed to go in the code or the file system.
* Integration of any content that is not yours.
* Any sort of code emulation, e.g. Commodore 64, Atari, etc.
* Anything offensive in nature, though farts are now acceptable.
* Use of iPhone logos or imagery, apparently not even in video tutorials demonstrating how to use your app.
* Misuse of user interface elements and the Human Interface Guidelines which would confuse the user.
* Duplicating the iPhone's built-in functionality.
* Use of Amazon.com APIs and content.
* You copy another app already published on the App Store in a manner that seems more like "theft" than "competition."

Tuesday, July 21, 2009

Iphone Call Forward Options



Sick and Tired of Problem with limited iPhone call forwarding features.
dont worry, there is a fix for it.
you can actually forward call from iphone to other mobiles.

Forward All:
Activate: *21*[dest]*11#
Cancel & Retain: #21*11#
Re-establish: *21*11#
Cancel & Forget: ##21*11#
Status: *#21*11#

If Busy:
Activate: *67*[dest]*11#
Cancel & Retain: #67*11#
Re-establish: *67*11#
Cancel & Forget: ##67*11#
Status: *#67*11#

if no answer:
Activate: *61*[dest]*11*[sec]#
Cancel & Retain: #61*11#
Re-establish: *61*11#
Cancel & Forget: ##61*11#
Status: *#61*11#

If Unreachable:
Activate: *62*[dest]*11#
Cancel & Retain: #62*11#
Re-establish: *62*11#
Cancel & Forget: ##62*11#
Status: *#62*11#

**WHEN YOU ENTER THE NUMBER IN KEYPAD, YOU WILL SEE A MESSAGE FROM SERVICE PROVIDER**

Monday, July 20, 2009

Iphone Video Converter



Powerful, easy to use video conversion software converts among all popular video and audio formats with fast conversion speed.

Download

Sunday, July 19, 2009

Autodelete 2.13 (Temp Files, Cache.....)



This program can automatically delete files in a specific folder that are older than the specified time. It checks the file dates by modification time. You can have it run on every Windows start up to delete old temp files, backups, webcam snapshots history, temporary internet files, etc...

Note: If you get an "Error 5:" message when autodelete runs, then you most probably are a Windows Vista user and have UAC (User Account Control) turned on. The only way to run autodelete with UAC on is by running it as an administrator. You can also right-click on the autodelete shortcut and go to the 'advanced' tab, then the 'advanced' button and activate 'run as administrator'. The program will not give an error but you will get a UAC warning every time the program runs. I have not found a way to avoid this yet, so the only advice I can give is to disable UAC by going to the controll pannel and in the search type 'disable UAC', you will be given a link to disable UAC.

Download

Fotosizer - Batch Image resizing made easy...



Fotosizer is a application batch image resizer tool. It resizes your photos in just 3 easy steps - 1. Photo selection, 2. select resize settings, then 3. Start the resize!
Increasingly, sharing photos on the internet is becomming more and more popular. Photos, represented as JPEG files from digital cameras, taken at high resolutions are far too large to send over the Internet, with some photos ending up at 5 mega bytes. Uploading one photo to a photo sharing website is fine, but 10, 20, or even more, this can take forever, especially on a dial-up connection.

With Fotosizer, you can shrink JPEG image files, along with other supported formats, and dramatically reduce internet transfer times, enabling you to quickly and easily prepare your image collections to be published on the web.


Download

JPEGsnoop 1.4.1 (Test JPG file authenticity)



JPEGsnoop is a free Windows application that examines and decodes the inner details of JPEG and MotionJPEG AVI files. It can also be used to analyze the source of an image to test its authenticity.

Introduction

Every digital photo contains a wealth of hidden information -- JPEGsnoop was written to expose these details to those who are curious.

Not only can one determine the various settings that were used in the digital camera in taking the photo (EXIF metadata, IPTC), but one can also extract information that indicates the quality and nature of the JPEG image compression used by the camera in saving the file. Each digical cameras specifies a compression quality levels, many of them wildly different, leading to the fact that some cameras produce far better JPEG images than others.

One of the latest features in JPEGsnoop is an internal database that compares an image against a large number of compression signatures. JPEGsnoop reports what digital camera or software was likely used to generate the image. This is extremely useful in determining whether or not a photo has been edited / tampered in any way. If the compression signature matches Photoshop, then you can be pretty sure that the photo is no longer an original! This type of analysis is sometimes referred to as Digital Image Ballistics / Forensics.

JPEGsnoop reports a huge amount of information, including: quantization table matrix (chrominance and luminance), chroma subsampling, estimates JPEG Quality setting, JPEG resolution settings, Huffman tables, EXIF metadata, Makernotes, RGB histograms, etc. Most of the JPEG JFIF markers are reported. In addition, you can enable a full huffman VLC decode, which will help those who are learning about JPEG compression and those who are writing a JPEG decoder.

Other potential uses: determine quality setting used in Photoshop Save As or Save for Web settings, increasing your scanner quality, locating recoverable images / videos, decoding AVI files, examining .THM files, JPEG EXIF thumbnails, extract embedded images in Adobe PDF documents, etc.

File Types Supported

JPEGsnoop will open and attempt to decode any file that contains an embedded JPEG image, such as:

* .JPG - JPEG Still Photo
* .THM - Thumbnail for RAW Photo / Movie Files
* .AVI* - AVI Movies
* .DNG - Digital Negative RAW Photo
* .CRW, .CR2, .NEF, .ORF, .PEF - RAW Photo
* .MOV* - QuickTime Movies, QTVR (Virtual Reality / 360 Panoramic)
* .PDF - Adobe PDF Documents

* Note that video file formats (such as .AVI and .MOV) are containers, which can include video streams encoded in one of a wide variety of codecs. JPEGsnoop can only interpret this video footage if the codec used is based on Motion JPEG (MJPG).

Download

Friday, July 17, 2009

teamviewer 4



TeamViewer establishes connections to any PC or server all around the world within just a few seconds. You can remote control your partner's PC as if you were sitting right in front of it.
And It FREE....

DOWNLOAD

Wednesday, July 15, 2009

Bite SMS 4.1(both QR & QC)



Please find the Working BiteSMS 4.1 with QR and QC.

Download

*************************************************
You need to Place the .Deb File to your device thru SSH.

-SSH into your iPhone
-Place file to /var/root/
Use Mobile Terminal or putty
username: root
password: alpine
dpkg -i /var/root/bitesms_4.1_wortel.deb
Press enter
Respring or reboot....

Note: I havent created this File, i am just sharing this, thanks for the Originally Posted by smcrack.

Thursday, July 9, 2009

SSH to Iphone 3G 3.0



For those who have been wondering why you can't ssh into your 3.0 phone via iTunnel Suite 2.7 since you upgraded itunes, here is the fix..

1- Goto C:\Program Files\iPhone Tunnel Suite 2.7 BETA\iTunnel\ and rename iTunesMobileDevice.dll to iTunesMobileDevice.dll_Original.

2- Copy iTunesMobileDevice.dll from C:\Program Files\Common Files\Apple\Mobile Device Support\bin\ to C:\Program Files\iPhone Tunnel Suite 2.7 BETA\iTunnel\

Orginal Post@:http://www.modmyi.com/forums/general/639301-finally-able-ssh-using-itunnel-suite-3-0-a.html