Mac Cloner Psystar Guilty of Violating Apple’s Copyright

picture-2Apple has won an important round of its legal battle against Psystar, a Florida-based startup that has been selling Mac clones for over a year.

U.S. District Judge William Alsup ruled late last Friday that by selling PCs hacked to run Mac OS X, Psystar has violated Apple’s copyrights. Alsup also ruled that Psystar violated anti-circumvention provisions in the Digital Millenium Copyright act.

Psystar in April 2008 opened its business selling non-Apple PCs hacked to run Mac OS X. Its first offering was a desktop system called the “OpenMac,” which cost $400 — about $2,400 cheaper than Apple’s Mac Pro. Apple filed suit in July 2008, alleging that Psystar was committing copyright, trademark and shrink-wrap license infringement.

“Psystar’s use of Mac OS X has been in excess and has violated Apple’s copyrights,” the judge wrote in his 16-page order.

Apple’s end-user agreement for Mac OS X reads, “You agree not to install, use or run the Apple Software on any non-Apple-labeled computer, or to enable others to do so.” In his Friday, Alsup noted that Psystar did not modify Mac OS X, but instead installed the software used to circumvent settings on non-Apple PCs to install Mac OS X. Alsup said this action constituted “facilitation of circumvention” and was a violation of Section 1201(a)(2) of the DMCA, which states the following:

(2) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that –

(A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title;
(B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title; or
(C) is marketed by that person or another acting in concert with that person with that person’s knowledge for use in circumventing a technological measure that effectively controls access to a work protected under this title.

    Though Apple has won this portion of the case so far, the Cupertino, California company still has a long road ahead if it wishes to destroy the entire “Hackintosh” industry. In an article summarizing Apple’s battle with Psystar, ArsTechnica’s Jacqui Cheng cites Fred von Lohmann of Electronic Frontier Foundation, who said there are plenty of workarounds still available to hack OS X, which are not repeating Psystar’s offenses.

    “While the ruling is a serious setback for Psystar, I don’t see it having much impact beyond the facts of that case,” von Lohmann told Ars. “On a number of important points, the outcome was driven by Psystar-specific factors, such as Psystar forfeiting one of their strongest defenses by failing to plead it in time. Moreover, my understanding is that the commercial ‘hackintosh’ industry has moved on to selling software that enables the user to bring their own PC and OS X DVD, rather than selling a pre-installed solution like the one at issue in the ruling.”

    An example of a Hackintosh solution is a dongle with the Mac OS loaded, which ships with PCs, effectively turning them into sort-of Mac clones, which Wired.com reported in November. A lawyer told Wired.com such a device would face legality issues with regard to copyright, because the device would copy the Mac BIOS and put it in a chip. However, it would likely require another long legal battle with Apple, since the circumstances are different.

    Meanwhile, plenty of open-source DIY solutions for consumers to install Mac OS X on non-Apple hardware are still available on the web. Thus, it’s unlikely Apple will put an end to the Hackintosh era anytime soon.

    Apple and Psystar are scheduled for a final briefing on Dec. 14 to declare any monetary relief Apple may receive as a result of the hearing.

    See Also:


    Verizon Won’t Offer Free Tethering, but Droid Hackers Might (Updated)

    091028_motorola_droid_008

    Updated 8 p.m. EDT: Google has released the source code for Android 2.0, according to Android developer Cyanogen.

    In TV ads, Verizon is trying to sell its new Google-powered phone by highlighting everything the “Droid Does” that the iPhone doesn’t. But the Droid will be able to do much more than Verizon is telling you. For example: free tethering, iPhone-like multitouch and CPU overclocking.

    Similar to the jailbreak community hacking the iPhone, there’s a group of Android developers determined to grant any Google-powered phone free access to every feature imaginable. And they’re able to accomplish this task more legitimately than underground iPhone hackers, since Android’s source code is completely open to developers.

    That gives developers an end-run around carriers, like Verizon, that might have their own ideas — like charging a $15 to $30 monthly fee for tethering.

    The source code for Android 2.0, aka Eclair, hasn’t been released by Google yet, so a custom build for the Droid isn’t yet available. But customized versions of the OS already exist for previous Android phones, and given the open source nature of Google Android, it’s inevitable a modified firmware bundle will arrive in the near future.

    Ever since the birth of the Android platform, developers have been working on a process called “rooting,” which gains administrative rights to a device. That allows developers (and users) to have complete control and to utilize all the features found in the Android platform. Now independent developers bundle features such as tethering, overclocking and multitouch into custom OS builds that are available free for download. Firmware mods makes it easy for a regular Android user to have it all.

    What exactly does that mean for Droid customers, or owners of any Android phone for that matter? You’ll be able to install modified firmware onto your smartphone and gain access to everything Android is capable of — without paying extra fees on top of your cellphone bill — so long as the hardware can technically support it. For example, you won’t have to pay $30 for Verizon’s official tethering plan so long as you install a free mod that includes the feature.

    Earlier Android phones — the T-Mobile G1 and MyTouch 3G — have already been hacked to support Google Maps Navigation, which is supposed to be a Droid-exclusive feature. Thanks to the folks at the XDA Developer forums, all that G1 or MyTouch owners have to do is reinstall an updated version of Google Maps and change configuration settings.

    Some manufacturers and carriers are already embracing the direction of open customization with all the available and upcoming Android devices that are hitting the market. For example, T-Mobile’s official development forum allows developers and consumers to discuss step-by-step directions on rooting an Android device. T-Mobile customers who have gone this route enjoy the perks of data tethering, for example, without an additional cost.

    You can assume that Verizon, a company which just doubled its early termination fee, won’t look as kindly on the idea of customers rooting their devices and tethering for free.

    Of course, changing the way a device operates from a manufacturer’s specifications always comes with a risk, and an Android phone is no exception. There are warnings about “bricking” your phone, which renders a device unbootable, and this commonly happens after installing a custom build of Android. Although it is considered a rare occurrence, a quick Google search brings up many results of Android users asking for help or wondering if their phone is, in fact, bricked.

    And don’t think a carrier or manufacturer will offer any assistance with issues caused after modding their device, a clear violation of most Terms of Use. When someone discovers a way to root the Droid, Verizon doesn’t have to take the T-Mobile route of turning a blind eye to these changes. It could retaliate by terminating contracts and voiding warranties.

    With all that said, just when can we expect a mod for the Droid, for those willing to take on the risks? Google has not announced when it would release Android 2.0’s source code, but Android engineer Jean-Baptiste Queru has said it’ll happen eventually.

    “There are a number of things that need to happen before any Open-Source release can happen, and those haven’t all happened for Eclair yet,” Queru wrote on the official Google Groups page. “For all I know all of those things will eventually happen. The overall process for any such release routinely takes a few weeks depending of course on the size of the release, and Eclair is a big release.”

    See Also:

    Photo: Jon Snyder/Wired.com


    Windows Marketplace’s newest anti-piracy measures already thwarted

    Yar, that was fast. Less than a day after Microsoft updated its Windows Marketplace for Mobile with new advanced anti-piracy measure, some apt xda-developers community member has managed to crack the new code — in under two hours, according to Chainfire’s posting. The hack itself won’t be posted, but we’re sure other astute programmers, many of more nefarious intention, will be able to have their way with it just as easy. Sad for developers who’ve been wanting something more secure — better luck next update.

    [Via WMPoweruser]

    Filed under:

    Windows Marketplace’s newest anti-piracy measures already thwarted originally appeared on Engadget on Thu, 12 Nov 2009 20:21:00 EST. Please see our terms for use of feeds.

    Read | Permalink | Email this | Comments

    Jailbreakers Battle Apple for Control of iPhone

    iPhone Jailbreak

    When he was 17, George Hotz poured hundreds of hours of his summer vacation into a special project: learning the iPhone’s secrets. His unpaid labor eventually paid off. With the help of a soldering iron, he was the first to unlock the iPhone, delivering the handset to international networks before Apple had a chance to.


    He got some perks, too. His unlock catapulted him to internet stardom, catching the eye of an entrepreneur who traded his Nissan 350Z car for Hotz’s restriction-free iPhone. Hotz, now 20, makes a living as a “hacker for hire” of sorts — getting paid to break into different types of gadgets. He gets to spend his free time unofficially attending a college, where he pretends to be a student just to socialize.

    What’s best, Hotz didn’t think unlocking the iPhone was even hard.

    “It did take 500 hours, but thinking back to some of the stuff I’ve done now, the first iPhone was incredibly easy,” Hotz said in a phone interview.

    But what was an easy task for a curious teen has turned into a persistent headache for Apple, one that the company has been trying to cure for over two years, with little success. With each new version of the iPhone operating system, a small army of independent programmers and hackers get to work prying it open, removing restrictions and making their iPhones do things that Apple CEO Steve Jobs never intended.

    To stay faithful to agreements with telecom partners, Jobs in September 2007 declared Apple was playing a “cat-and-mouse game” to disable unlocked iPhones. Apple regularly issues software updates to disable hacked, unlocked versions of the handset. But within a few weeks, new hacks emerge, freeing the iPhone from carrier restrictions again.

    In fact, Hotz just last month released the easiest hacking solution for the iPhone to date. Named “Blackra1n,” his software can hack and unlock an iPhone in just two minutes. All the user needs to do is plug in an iPhone, launch the application and click a button.

    It’s safe to say this is a game where the mouse has outrun the cat, and it’s unlikely Apple will catch up anytime soon. That’s because Apple is up against a lot more than an individual hacker. The iPhone and its App Store not only gave birth to a new digital frontier for mobile software, but created an entire underground ecosystem: the Jailbreak community. In addition to multiple iPhone hacker groups pumping out different unlocking solutions on a regular basis, there are several stores hosting unauthorized iPhone apps and programmers developing software strictly for hacked iPhones.

    Humble Beginnings

    4098455769_463df9b516

    Available for jailbroken iPhones, themes can change the entire look of the iPhone's menu screen with special buttons and skins. The appearance of the traditional iPhone Home screen cannot be changed. The above theme is called Pitseleh, authored by "Monty" of MacCiti.com, a site that hosts content for hacked iPhones.

    Hackers adopted the word “jailbreak” to describe the act of overriding the iPhone’s restrictions to install unauthorized software in the device. Jailbreaking is the first step an iPhone owner must take in order to later execute the hack to unlock the handset, enabling it to work with any carrier. The original iPhone was extremely insecure and thus very easy to jailbreak, according to Hotz, and hackers almost immediately broke into the gadget after it debuted in June 2007.

    Jailbreaking accelerated quickly. Soon, hackers reverse-engineered major parts of the iPhone API, and they opened doors to creating and installing third-party apps for the device. Games, utilities and even custom themes and wallpapers enhanced the capabilities of the handset. To Apple enthusiasts, this was exciting: The iPhone at the time had no App Store, so jailbreaking was the only way to get more than the handful of basic apps provided by Apple.

    In August 2007, Hotz announced he had unlocked the iPhone with the Dev Team, a group of hackers that posts jailbreak tools and instructions. Soon after, Hotz released software that anyone in the world could use to make their iPhone work with any carrier’s SIM card.

    When Apple in July 2008 opened its official App Store, the urge to jailbreak got less exciting. The App Store grew quickly — with 100,000 apps to date — making the act of jailbreaking seemingly irrelevant to the average iPhone owner, who could download Apple-sanctioned apps without risk.

    Reformation

    3G Unrestrictor

    iPhone users can only download files smaller than 10MB from the iTunes Store. Also, some third-party apps will not work on a 3G connection, limiting use to Wi-Fi only. 3G Unrestrictor, an app available through the unauthorized app store Cydia, removes 3G restrictions from any app you choose.

    But the App Store didn’t stop the Jailbreak community from proliferating. Now that the App Store exists, jailbreakers have shifted their focus to creating work-arounds for the iPhone’s many restrictions. Most share an open-software philosophy, giving consumers full ownership rights over their product, or the ability to do whatever they wish with the gadget they paid for.

    Jay Freeman owns Cydia, an unauthorized app store open to jailbroken iPhones, which distributes iPhone apps Apple would otherwise forbid. Before opening his store, Freeman played an instrumental role in setting up the early groundwork for the jailbreak platform. Often referred to as “Saurik” in the Jailbreak community, Freeman admitted he was initially reluctant about the iPhone due to its stifling limitations.

    “Apple seems to have spent very little time looking at previous phones, and left out many features that users, such as myself, have come to expect,” said Freeman, reflecting on the original iPhone. “However, [a friend] insisted to me that jailbreaking was the future. The software it comes with doesn’t matter; I can just rewrite it all to my liking.”

    The need for an underground app store became more clear after Apple rejected several iPhone apps. The company faced severe scrutiny when it rejected the official Google Voice app, which would enable consumers to use a single phone number to ring all their phones, send free text messages and make cheap international calls. The move stirred so much controversy that even the Federal Communications Commission investigated the rejection.

    Unauthorized app stores served as a way of circumventing Apple’s censorship. And some programmers are even making money coding forbidden iPhone apps.

    “People are so annoyed by Apple and their shit, and if you give them opportunity to go around it, then they’ll even pay for it,” said Kim Streich, a developer whose app 3G Unrestrictor earned $19,000 in sales in just two weeks through Cydia.

    With more than 10 million jailbroken iPhones registered, Freeman’s Cydia store is the most popular underground app store. Icy and Installer, two previous unauthorized iPhone software distributors, have been discontinued.

    Perseverance

    George Hotz's self-portrait, included with his jailbreaking software, portrays him as a Caravaggio-style youth orbited by iPhones. Image credit: George Hotz

    Whenever Apple releases an iPhone update, the new software usually erases unauthorized apps and disables unlocked iPhones. In response, the iPhone hacker group Dev Team continues to post regular updates on its blog with instructions and new jailbreak patches for newer iPhone software. The Dev Team’s main jailbreak weapon is called Pwnage Tool, which creates a custom (hacked) patch for Apple’s iPhone firmware and then installs it on the device.

    To further combat jailbreaks, Apple has attempted to claim to the U.S. Copyright Office that jailbreaking is illegal. However, the Dev Team skirts around copyright issues by not copying and providing Apple’s software, according to Eric McDonald, a member of the Dev Team. Instead, the Pwnage Tool requires iPhone users to download Apple’s legitimate firmware, and the Pwnage Tool patches it with jailbreak code.

    Hotz, who was kicked out of the Dev Team after prematurely publishing information on iPhone hacks, still hacks away the iPhone on his own. Hotz doesn’t demand money for his work, though he does accept donations. He isn’t shy about showing his face to Apple or the world, either: When running Blackra1n, the iPhone temporarily displays a photo of Hotz styled as an angel from a Caravaggio painting (above).

    “Blackra1n is only 600K, and 200k of it is my picture,” Hotz said, laughing.

    Though the Jailbreak community persistently issues new hacks for iPhone updates, Apple is continuing to fight. A recent Apple job listing reveals the company is seeking an iPhone OS security manager to help prevent exploits, which could block future jailbreak solutions.

    Hotz doubted a security expert could block his efforts. In fact, he said he’s already discovered a brand new exploit that will jailbreak and unlock Apple’s fourth-generation iPhone — presumably due in stores summer of 2010 – even though he hasn’t touched it.

    “Personally I love that Apple keeps the iPhone closed,” Hotz said. “This is a personal hobby; it’d be no fun if Apple didn’t have it closed anymore. Get a Jailbreak cop and then I’ll show them what I can really do.”

    See Also:

    Photo: Jon Snyder/Wired.com


    Apple Didn’t Break ‘Support’ for Hackintoshes

    Apple’s latest Snow Leopard update breaks compatibility with netbooks hacked to run the Mac operating system. But it’s unlikely that the move signifies the company’s future plans to clamp down on the “Hackintosh” community, observers say.

    That’s because Apple’s Mac OS doesn’t support non-Apple products to begin with, so it would be misleading to say the latest update (10.6.2) “pulls” that support. In fact, Apple might not have even been aware that it was “breaking” support for hacked netbooks with this update at all.

    “Apple doesn’t have any hardware that relies on the Atom processor, so making sure that OS X supports the CPU probably isn’t just low on the priority list; it’s probably not even in the same zip code as the priority list,” said Brad Linder, writer of Liliputing, a netbook enthusiast blog.

    Still, Mac clones should be a touchy topic for Apple. For a brief period in the 1990s — when Steve Jobs was still exiled from Apple — Apple CEO Michael Spindler licensed the Mac operating system to several manufacturers. The move did not fare well for the company: Apple was near bankruptcy when Jobs retook the helm in 1997. One of the first items on Jobs’ agenda was to destroy the clone program, closing the gates to the Mac OS.

    More recently, Apple has also been in a legal battle with Psystar, a startup selling computers hacked to run Mac OS X. But that legal pursuit is a move to protect Apple’s intellectual property against other companies that could threaten the Mac marketshare.

    Thus, although the latest Snow Leopard update seems to disable “support” for netbooks, it’s likely Apple still doesn’t care enough to take action against consumers hacking away at their netbooks. A more simple, and probably true, explanation is likely that Apple is cleaning up Snow Leopard and optimizing code, said Michael Gartenberg, an Interpret technology analyst.

    “People are always ascribing these nefarious Oliver Stone-like notions about Apple, but they’re often wrong,” Gartenberg said. “If Apple were really serious, there are a number of ways to make it impossible to run OS X on any system.”

    Apple’s lack of a netbook offering doesn’t appear to affect the company. Last month, the company posted earnings results for its most profitable quarter ever. Apple also set a record for selling more Macs in a quarter than ever before, with 3.05 million units sold.

    “The financial results show that Apple’s not feeling any hurt from not having a netbook,” said Jason Snell, editorial director of Macworld magazine. “It just keeps selling more laptops, and making more money on them.”

    See Also:

    Photo: Charlie Sorrel/Wired.com


    Playable Neckties Made From Old Audio Tape

    sonic_fabric

    These Sonic Fabric neckties from Supermarket are plastic fantastic. Woven from boring old cotton mixed 50:50 with awesome old cassette tape (used), they lend the wearer the same delicious contrast as eating hot apple pie and cold ice cream together.

    But, whatever, right? Who really cares about a corporate leash, even if it is made from old geekwear? Well, these suckers are playable, if you are willing to rip apart an old Walkman (and you should be, as it is otherwise useless). It’s a pretty easy project: you free the playhead from the player and then rub it over the fabric, creating some rather garbled, underwater-sounding sonic susurrations (the video is embedded below).

    The ties cost $90 each, but for that you get the tape portion of the fabric hand recorded before weaving. This particular batch contains the designer’s own music, a soundscape of samples grabbed from the NYC metro system.

    Product page [Supermarket]

    See Also:



    MMS for iPhone 2G and tethering on OS 3.1.2 explained, not for the faint of heart

    Let’s be clear upfront that this isn’t for the casual iPhone jailbreaker, but if you feeling like living on the edge, you can give your original model an added boost of MMS capability, or any device with OS 3.1.2 the power to tether. Highlighted in a series of tweets today by iPhone dev team lead MuscleNerd, whiterat (for MMS) and two-bit (for tethering) will get the job done, but both require tinkering with the baseband, which is exponentially more advanced and brick-inducing than, say, installing Cydia. Venture forth with the instructions beyond the read links below.

    [Via 9 to 5 Mac]

    Read – iPhone 2G MMS
    Read – OS 3.1.2 tethering

    Filed under:

    MMS for iPhone 2G and tethering on OS 3.1.2 explained, not for the faint of heart originally appeared on Engadget on Mon, 19 Oct 2009 21:49:00 EST. Please see our terms for use of feeds.

    Permalink | Email this | Comments

    False Alarm: New iPhone 3GS Not Jailbreak-Proof

    jailbreak
    Apple has reportedly begun shipping iPhone 3GS units with a new bootrom, which might help combat hacks enabling installation of unauthorized software. However, iPhone hackers say Apple’s new firmware only causes a temporary inconvenience for jailbroken devices, and the handset is still hackable.

    “It’s not going to be impossible to jailbreak even if the exploit we used is gone,” said Eric McDonald, a member of the iPhone Dev-Team, which publishes tools to jailbreak the iPhone, in a phone interview with Wired.com.

    McDonald explained that current tools will still work with the latest batch of iPhone 3GS units. The “24kpwn” exploit used to help jailbreak previous iPhones and iPod Touch devices only made it easier to boot up the hacked devices.

    The newly shipping iPhone 3GS’s bootrom interferes with 24kpwn, but that will only make the handset difficult to start up after it shuts down. Booting up will require being “tethered” to a computer. That means if you shut down a jailbroken iPhone 3GS, or if it runs out of power, you can only turn it back on by plugging it into a computer.

    In short, changing the bootrom makes owning a jailbroken iPhone even more of a hassle than it already is. However, McDonald said the Dev-Team will just have to find a new exploit to enable untethered booting once again.

    Several publications on Wednesday reported Apple’s latest iPhone 3GS units came with presumably jailbreak-proof firmware. The reports were half correct: The phones do indeed ship with different firmware with a new bootrom, but they are still hackable.

    McDonald compared this situation with the newest iPhone 3GS devices to the second-generation iPod Touch. Apple shipped this iPod Touch with a different bootrom from the previous version, and for a while, owners who jailbroke the device needed to tether their devices in order to boot up. Later, the iPhone Dev-Team released another exploit to enable untethered booting.

    The iPhone jailbreak community emerged soon after the original iPhone launched in June 2007. Hackers discovered methods to install unauthorized third-party software on the device, as well as unlock the iPhone to work with carriers that otherwise did not serve the iPhone.

    Apple wasn’t pleased. At the launch of the British iPhone in September 2007, Steve Jobs said Apple would work to suppress unlock hacks.

    Apple has even suggested to the U.S. Copyright Office that jailbreaking is illegal — to no avail, as the Dev-Team has been careful to only provide patches hacking the iPhone, as opposed to copying the software, according to McDonald.

    “It’s a cat-and-mouse game,” Jobs said in September 2007. “We try to stay ahead. People will try to break in, and it’s our job to stop them breaking in.”

    With the latest upgrade, it appears Apple has not stopped the Dev-Team from breaking in. But for the time being, the company has made hacking new iPhones very inconvenient and perhaps impractical.

    See Also:

    Photo: Slickmeister/Flickr


    Video: iPhone Exposé Hack

    This iPhone Exposé hack is a little pointless now that the iPhone has a Spotlight search for quickly launching applications, but it is undeniably fun in a heavy-on-the-eye-candy way. It is also a little slow and jerky, but that could be because the hack is in its alpha stage right now.

    Yes, an alpha hack for the jailbroken iPhone. It’s hard to live more on the edge than that when it comes to gadgets. The developer, Steve Troughton-Smith, will likely include this in his much more polished iPhone app, Stacks, which brings OS X Dock-style pop-up stacks to the iPhone’s measly four-icon dock.

    iPhone 3GS gets Exposé hack [Slashgear]

    Product page [Stacks]


    5 Fun Gadget Hacks to Tackle on a Rainy Day

    2646666117_1d7b5df5ef_b

    Avast! There be a mighty tempest rocking the good ship Gadget Lab. OK, it’s just raining really hard in San Francisco and most of the Bay Area. But what better time to check off all those do-it-yourself gadget projects you’ve exiled to the bottom of your to-do list?

    Sure, copious sunlight makes it hard to concentrate on backing up your data. But when it’s pouring and there’s nothing better to do than geek out, tasks like beautifying your iTunes library, turning your Mac Mini into the ultimate media center, or hacking your netbook can be a dorktastic blast.

    Even if the skies are clear in your city, here’s a list of tech-centric activities you can take on when the weather is being a harsh mistress. Trust us — they’re a lot more fun than playing Monopoly or constructing a magical butterfly garden.

    1. Straighten Out Your iTunes Library With TuneUp


    Anybody with a sizable iTunes music collection is bound to have a bunch of albums with incorrect or ungrammatical song tracks (e.g., Track 01, Track 02, “here comes the sun,” etc). TuneUp is an awesome plug-in that hooks into an online database and analyzes your incorrect track titles and automatically renames them for you.

    The TuneUp plug-in automatically launches with iTunes, and you drag a list of incorrect song tracks into the TuneUp menu to begin automatic renaming. The only drag is that it takes about 5 to 10 seconds per song, so if you have a ton of improperly named tracks, this can take a pretty long time.

    Other than renaming songs, TuneUp can also identify any albums in your iTunes library that are missing cover art. Then, it will download that art from its database and automatically tag it onto the respective album.

    TuneUp isn’t 100 percent reliable, especially when it comes to dealing with super-indie tracks, but it successfully fixed up about 80 percent of my iTunes library, which contains about 5,000 songs. Not bad. TuneUp costs $20 for a one-year license, or $30 for a lifetime license.

    2. Turn Your Mac Mini Into the Ultimate Entertainment Box

    picture3cu

    Ever dream of a TV set-top box that offered every type of media you can imagine? An ultraversatile media machine doesn’t really exist yet on the market, but if you own a Mac Mini, you’ll like this solution. Sporting a gorgeous UI, Plex Media Center is a Mac app that serves your movies, TV shows, music and even content from websites such as Hulu and Netflix. It supports a large number of file formats, so even digital pirates will be pleased. Just install Plex on a Mac Mini, hook up the Mini to your TV and you’re gold. You can access and control Plex with your Apple remote, so forget about that shoddy keyboard-and-mouse experience.

    Similar to TuneUp, Plex uses metadata from the internet to automatically retrieve art to accompany your media. In the screenshot above, Plex provides that slick Seinfeld background. One caveat: It’ll take some time to make Plex look just right. Plex can be pretty particular about just how you organize your files in order for it grab metadata for your media files. That means you’ll have to do lots of renaming of files and folders. Example: To load that Seinfeld menu, Plex required arranging the folders as such: Movies–>Seinfeld–> Season 3. Still, it’s worth the time and effort.

    The best part? Plex is free.

    3. Hack and Mod Your Netbook

    Netbooks are popular not just because they’re so small and convenient to carry around everywhere; they’re surprisingly hackable. There’s a wealth of literature on the web that will teach you how to hack a netbook to run Mac OS X, or install mods such as an HDTV tuner, GPS or Bluetooth.

    We know you dig the idea. Wired.com’s How-to Wiki has some tutorials to get you started: Run Mac OS X on a Netbook and Turn a Netbook Into a Net Jukebox.

    4. Throw Your Hard Drive in the Cloud


    … the digital cloud that is the interwebs, of course. Indeed, cloud storage is the hip way to manage your data (unless you’re a T-Mobile Sidekick customer). By throwing your files into a cloud-based service such as Dropbox or Box.net, you’re automatically backing them up to protect against data loss. Not only that, you can enjoy access to your files from any computer with an internet connection. For example, on my office computer, I can listen to my entire iTunes library, which I copied into Dropbox.

    The words “cloud storage” are pretty yawn-inducing, but once you get past that and start experimenting with the tech, it’s pretty fun. After trying out cloud backup services, you might consider throwing your notes into Evernote, an online note-taking service. Evernote has apps not only for the Mac and Windows, but also for several smartphones including the iPhone and RIM BlackBerry. When I find a recipe I like while browsing the web with my computer, I paste it into Evernote, hit Sync, and then on my iPhone I launch the Evernote app — and there’s the recipe. Pretty sweet.

    5. Set Your iPhone Free


    Apple plays gatekeeper for its iPhone, enforcing stringent control over what types of third-party software appear in its App Store. This, of course, has resulted in some questionable app rejections, most of which blew over after a short duration. But Apple crossed an invisible line when it rejected the Google Voice app, a service that enables users to rely on a single phone number to ring all their phones, while also delivering the gift of free text messages and voicemail service, as well as cheap international calls. Fortunately, there’s a way around Apple’s restrictions: Jailbreaking the iPhone.

    Jailbreaking (i.e. hacking) the iPhone gives you access to an unauthorized app store called Cydia, which offers a Google Voice app among other wares Apple would forbid. Want to tether your iPhone? There’s a Cydia app for that. Want to download files larger than 10 megabytes on the 3G network? Yup, there’s an unauthorized app for that, too. Jailbreaking is also the first step you must take if you wish to unlock your iPhone to work on a different carrier, such as T-Mobile.

    The drag about jailbreaking is that it just isn’t very convenient. Every time Apple releases a software update, you lose access to Cydia, and your unauthorized apps temporarily disappear. Then you must jailbreak and re-download those apps again. (If you paid for a Cydia app the first time, you don’t have to pay to download it again.) But if you actually have free time, having a jailbroken iPhone can be largely beneficial.

    From our experience, the best tutorials on jailbreaking can be found at iClarified, and if you need more visual aids, plenty of YouTube users have posted tutorials as well. What are you waiting for? Jailbreak away!

    What are the rainy day activities you enjoy with your gadgets? Post your suggestions in the comments below.

    See Also:

    Photos: William Hook/Flickr, michaelhilton/Flickr, 60 in 3/Flickr