Saturday, May 7, 2011

Jailbreak iOS 4.3.3 Untethered on Mac OS X Using PwnageTool 4.3.3 [How-To Guide]

Image representing iPad as depicted in CrunchBaseImage via CrunchBase
iPhone Dev-Team has just released PwnageTool 4.3.3 for iOS 4.3.3 untethered jailbreak on Mac OS X. With PwnageTool 4.3.3, you can create iOS 4.3.3 custom IPSW for all iDevices except iPad 2. Restoring this custom cooked iOS 4.3.3 IPSW on your iPhone will not only jailbreak it on iOS 4.3.3 untethered but will also preserve its current baseband. Just likeRedsn0w 0.9.6RC15 and Sn0wbreeze 2.7, this build of PwnageTool is based on i0n1c's untethered payload and Geohot's Limera1n exploit.

continue reading
Enhanced by Zemanta

Download TinyUmbrella to Save iOS 4.3.3 (iOS 4.2.8) SHSH Blobs for iPhone 4/3GS, iPod Touch 4G/3G, iPad 2/1

Image representing iPhone as depicted in Crunc...Image via CrunchBase
Notcom has just released a new TinyUmbrella update (v4.33.00) which is now capable of saving iOS 4.3.3 SHSH blobs for iPhone 4(GSM)/3GS, iPod Touch 4G/3G, iPad 2/1 and iOS 4.2.8 SHSH blobs for Verizon iPhone 4. For those who don't know, an SHSH blob is a code which iTunes returns after singing your ECID from Apple servers and it is used to verify the version of iOS you are running!

Whenever you upgrade the firmware of your iDevice, you must save your SHSH blobs before Apple closes the SHSH window. If you will not save your SHSH blobs for the specified firmware, you will not be able to downgrade to that specific firmware in future once Apple releases a new iOS version.
continue reading
Enhanced by Zemanta

Friday, May 6, 2011


Whether it is the most beautiful looking device or the most stable, satisfying our cravings to make things look and feel different has been this site’s main driving force for many years. Even though this device just came out recently,Things have kicked off with root and recovery, and now we will get started with the looks. This is a very nice guide where the developer explains how to change a few fonts for the clock in the lockscreen of the device.
  • Working ADB
  • Asus PC Sync Software link
  • USB Debugging turned on in settings
  • a .ttf font file (only required if you want another font than used in the guide)
Step 1: Backup Original Files
  1. Open up cmd (or terminal on OSX).
  2. navigate to your android-sdk\tools folder through the terminal (if you do not know how to do this check the adb set up guide linked earlier in this post).
  3. Now to allow modification of the system files we will enter the command “adb remount“.
  4. Now we will pull the font files which are located within /system/fonts/ by entering these 3 commands: “adb pull /system/fonts/AndroidClock.ttf“, “adb pull /system/fonts/AndroidClock_Highlight.ttf“, “adb pull /system/fonts/AndroidClock_Solid.ttf
  5. On your computer go to the android-sdk/tools folder and move the AndroidClock, AndroidClock_Solid and AndroidClock_Highlight to wherever you want to store these (these are the original back up) and make sure to remove them from the android-sdk\tools folder.\
Step 2: Replacing Original Files
n this step we will pull the font used for all the other type in honeycomb called DroidSans and replace the original clock font files with this font as to fool honeycomb into thinking it is actually the original font.
  1. while having adb open, enter the command “adb pull /system/fonts/DroidSans.ttf“.
  2. Now navigate to your android-sdk\tools folder again and make 3 copies of DroidSans.ttf in the tools folder.
  3. Name one of the files AndroidClock, name another AndroidClock_Solid, and name the last AndroidClock_Highlight.
  4. now go back to adb and enter these 3 commands: “adb push AndroidClock_Solid.ttf /system/fonts/“, “adb push AndroidClock.ttf /system/fonts/“, “adb push AndroidClock_Highlight.ttf /system/fonts/“.
  5. Reboot your transformer and voila you’re done.
If you want to replace the lockscreen font with your own font and not DroidSans, simply skip bullet point 1 and 2 of step 2 and copy your own .ttf font file to your android-sdk\tools folder and make 3 copies of that.Don’t forget to remount /system as rw (“mount -o rw,remount /system”) so you can modify the font files.
For further support and assistance please contact the developer here


If you are a ViewPad 7 Android tab owner and looking for installing a custom firmware on it then an alternative recovery partition is a must. And believe it that this can only be done via some tools including the one we are going to literate you on. In order to install custom firmware on the Viewpad 7 and equivalent devices (Cherry Mobile Superion, Commtiva Linx N700, Olivepad VT-100, Spice MI700, and Camangi FM600) you must use an alternative recovery partition. There are several methods to accomplish this, but in this thread I will document what I use personally.

1. Download version 1.7 of Super One Click.
2. Place your Android device into debugging mode, and connect to computer.
3. Right-click the Super One Click executable and select ‘Run As Administrator’.
4. At program launch select ‘rageagainstthecage’ exploit method, then select ‘Root’.
5. If there is no activity for more than 30 seconds and the terminal display is stuck at ‘Running rageagainstthecage….’ remove the USB plug momentarily and plug back in.
6. You should get the message “***IF IT KEEPS LOOPING, TRY DISABLING USB DEBUGGING NOW***” followed by an ADB reset, waiting for device, and finally a successful rooting message. (Apparently the looping issue is a known bug).
7. Once this process is complete your prompted to test the root condition. Follow the steps to verify.

Stock Backup:

1. Open up ADB shell within a terminal.
2. Get the list of partitions:
cat /proc/mtd
3. Pull each original partition from the device onto the SD card:
cat /dev/mtd/mtd3 > /sdcard/recovery.img (example…change for each partition)

Install Alternative Recovery Partition:

2. Open a terminal (via computer or terminal emulator). Enter ADB shell.
3. Within ADB shell enter the following to change permissions for the flash_image:
chmod 755 /system/bin/flash_image
4. Replace the original stock recovery image by copying the clockwork image in it’s place:
flash_image recovery /sdcard/cwrecovery.img

Installing Custom Firmware:

1. Copy the custom firmware of your choice to the SD card.
2. Power down your device.
3. Depress both volume keys simultaneously followed by holding in the power switch for a few seconds.
4. Upon power up you will see the birds logo and ‘enter recovery’ text in the top left corner of the screen.
5. Use the volume keys to step through the menu.
6. Select ‘Backup & Restore’ followed by ‘Backup’ to make a ‘NANDROID’ backup of the current firmware. The backed up ROM should be located in: /sdcard/clockworkmod/backup/date&time/
7. Once the backup process completes you will be back at the main recovery menu.
8. Select ‘apply sdcard:
9. Once complete select ‘reboot device’.

It is strongly recommend having proper knowledge of recovery tools like ClockworkMod along with good knowledge of ADB shell. Backup your device before doing anything with your device.
Via : XDA

How to Downgrade iOS 4.3.3 to 4.3.2, 4.3.1, 4.3, 4.2.1 on iPhone 4, 3GS, iPad 2, iPad, iPod touch

The just released iOS 4.3.3 firmware update for iPhone 4 has been successfully jailbroken using custom PwnageTool bundles. The jailbreak though is tethered only for now, which means that you will have to boot it into jailbroken state every time you reboot.
iOS 4.3.3 iPhone 4 JailbreakCydia running on iOS 4.3.3, iPhone 4 (GSM)
Even though you can jailbreak iOS 4.3.3 with Redsn0w (tethered for now), but by using this PwnageTool bundle, you can preserve the old baseband so that your iPhone can be unlocked using Ultrasn0w. Also, an untethered jailbreak for iOS 4.3.3 is said to be on its way too!
Simply follow the instructions posted below to jailbreak iOS 4.3.3 on iPhone 4 using a combination of our very own PwnageTool bundle for iPhone 4, PwnageTool 4.3.2, and tetheredboot utility.
Here’s what you will need:
  • PwnageTool 4.3.2
  • iOS 4.3.3 firmware
  • iTunes 10.2.2
  • Mac OS X
  • PwnageTool bundle for iOS 4.3.3 
  • tetheredboot utility
  • There is no unlock for the new baseband on iOS 4.3.3. If your iPhone relies on a carrier unlock, DO NOT update to stock iOS 4.3.3.
  • iPad 2 users on iOS 4.3 should stay away from iOS 4.3.3 until further confirmation.
  • Cydia is fully working on iOS 4.3.3
  • It is a semi-tethered jailbreak.
  • Your baseband will not be upgraded during restore process.
  • Hacktivation is supported.
Modifying PwnageTool
Step 1Download PwnageTool bundle for your version of iOS device. Extract the .zip folder, in there you will find a .bundle file, for this guide, we are using iPhone 4 bundleiPhone3,1_4.3.3_8J2.bundle. Move this file to your desktop.
Step 2: Download PwnageTool 4.3.2 and copy it to /Applications directory. Right click, and then click on “Show Package Contents” as shown in the screenshot below.

Apple To Release Mac OS X 10.7 Lion Through The Mac App Store

Apple will release its upcoming Mac OS X 10.7 Lion with the Mac App Store being the primary distribution channel, reports AppleInsider.
Citing our old favorite, the ‘people familiar with the matter’, AppleInsider claims Apple will bring the next installment of its much loved OS X operating system to the masses via digital download though its Mac App Store. Available to all Macs running 10.6 Snow Leopard, the Mac App Store allows users to buy and download applications from the comfort of their own home with an experience mirroring that of the iPhone and iPad.
AppleInsider’s sources also claim that a version will be available on physical media for those without super-fast broadband connections or caps.
The move to digital distribution makes sense for Apple, with the company already offering developers the chance to try 10.7 Lion now via a special download code and the Mac App Store. Also, with the DVD drive-less MacBook Air posting huge sales numbers and other Apple mobile computers expected to lose their drives soon, it’s no surprise to see Apple moving further and further away from the plastic platters we’re all so used to.
10.7 Lion is due to be shown off at WWDC next month.