iPhone OS 3.0 beta 2 gets the jailbreak treatment

The jailbreakers have managed to keep their speed record intact. Just one day after Apple releases an update to the iPhone OS 3.0 beta, QuickPwn updates its wares to support the new firmware. According to the related writeup, it should work with all iPhone / iPod touch models. After going through the jailbreaking process, you’ll need to open icy and follow a few more steps to finish the job. As usual, download at your own risk, and for now, crack is for Windows users only.

Update: The Dev Team has chimed in with the usual list of caveats and warnings. If nothing else, you’ve now got tacit verification that this release of QuickPwn isn’t some malicious hack.

Filed under: , ,

iPhone OS 3.0 beta 2 gets the jailbreak treatment originally appeared on Engadget on Thu, 02 Apr 2009 01:58:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Mazda RX-8 controlled with iPod touch, Batman said to be jealous but coping

We’ve seen some interesting ways people have tried to meld iPhone with car, but this one might top them all. Meet Jon’s Mazda RX-8, controllable from anywhere in the world using an iPod touch over WiFi. As demonstrated on video, his custom web app can be used to lock and unlock the doors, start and stop the engine, and open the truck. A telemetry window provides data such as fuel level, battery voltage, RPM, speed, and temperatures. It’s even got a GPS so you can track the car’s wherabouts with Google Maps. All of this is accomplished with computer hidden in the trunk, hooked up to the on-board diagnostics, and equipped with a 3G modem to stay constantly connected to the interwebs. There’s no indication on whether he plans to take the mod further, but if so, we can only hope it involves some well-placed cameras and a tilt-controlled steering mechanism. We pity the foolish thief who tries to steal this “haunted” ride. Check out the video demonstration after the break.

[Via Hacked Gadgets]

Continue reading Mazda RX-8 controlled with iPod touch, Batman said to be jealous but coping

Filed under:

Mazda RX-8 controlled with iPod touch, Batman said to be jealous but coping originally appeared on Engadget on Wed, 01 Apr 2009 03:31:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments

Vista SP1 OEM BIOS Cracks Still Work

This article was written on February 08, 2008 by CyberNet.

I would say that Microsoft once again threw down the gauntlet when they announced that Vista SP1 will deactivate machines using OEM BIOS cracks and other methods used to circumvent activation. After over a dozen emails about the topic I decided that I would check out for myself whether Vista SP1 RTM really causes piraters as much trouble as they say it will.

My intention is not to condone piracy with this article, but the OEM BIOS cracks are among the most complex hacks available for any piece of software and they are pretty intriguing. What they do is actually trick Windows into thinking that you’re running a licensed copy of the operating which you purchased from your PC’s manufacturer. It therefore never asks you to activate the machine, and Microsoft even considers it to be “genuine.”

To test out the cracks I installed a fresh copy of Vista Ultimate (without SP1) in a virtual machine. I then used the Paradox OEM BIOS emulation to crack Vista, and it worked without hesitation. After that I installed Vista Service Pack 1 on the computer, and about an hour later I was presented with a deactivated Vista Ultimate SP1:

Vista Deactivation 

My initial though was that Microsoft did it, but like any other pirater I wasn’t about to give up. I tried reapplying the Paradox OEM BIOS crack, but it just wouldn’t work. Within minutes of searching I found another OEM BIOS emulation called Vista Loader. I deactivated the previous crack that I had just tried and fired up Vista Loader. I restarted my computer and you can imagine how surprised I was to see this:

Vista Reactivation

That’s right, my machine was not only fully activated but it was also “genuine” according to Microsoft. That means all of the Windows Updates and the Ultimate Extras were available to me. For those doubting my results here is a screenshot with all the details:

Vista Activation Status

Here are the things that I’ve highlighted in that screenshot:

  • The build number 6.0.6001.18000 indicates that I am indeed running Vista SP1.
  • The “Vista, OEM” shows that the operating system is recognized as a valid OEM version.
  • The partial product key is the last 5 characters from the key that I entered in. When you download the crack it is also accompanied by a list of serial numbers, and I’m sure that you’ll see a key containing “932CC” in that list.
  • The License Status is normally where it would indicate how much time I have left to activate, but it shows that I have a licensed (a.k.a. activated) copy.

I applaud Microsoft for trying to crack down on piracy (pun intended), but it looks like they couldn’t break all of the existing hacks that are out there. It seems like a lot of hassle to try and keep up with all of these cracks so I’ll definitely be sticking with my legal copies.

Note 1: Links to any cracks in the comments will be removed.

Note 2: There’s no sense in me blurring out the Product ID since this isn’t a legal copy of Windows anyway.

Note 3: The virtual machine that we had running this has already been taken down.

Copyright © 2009 CyberNet | CyberNet Forum | Learn Firefox

Related Posts:

Giz Explains: How a Brainy Worm Might Jack the World’s PCs on April 1

It’s lurking in millions of PCs around the world. It’s incredibly sophisticated and resilient, with built-in p2p and digital code-signing technology. It revels in killing security software. On April 1, the Conficker worm will activate.

The scariest thing about the Conficker worm is that literally millions of infected Windows PCs could be linked together to do its bidding. The second scariest thing is that no one really knows what its creator is going to do with this virtual army on April 1, when it’s scheduled to contact a server for instructions. It’s so bad, Microsoft has a running $250,000 bounty for the author, dead or alive. (Well, they probably want him alive, but they hate his guts.)

The New York Times’ John Markoff rounded up some of the more ingeniously evil possibilities in a compelling article, the most sinister being a “Dark Google,” postulated by University of California at San Diego researcher Stefan Savage, that would let bad people scour zombie machines all around the world for data to sell to other bad people.

But let’s back up a bit. Conficker—whose weird name is a combination of “configuration” and a slightly more polite word for f***er, according to Urban Dictionary—actually began life as a lowly, “not very successful” worm in November, says Vincent Weafer, VP at Symantec Security Response. Weafer told us it exploited a Microsoft remote server vulnerability that had already been announced and patched the previous month, so the only systems that were vulnerable were the ones that weren’t up to date.

The B release, pushed in December, on the other hand, was “wildly successful,” says Weafer, infecting millions of unpatched computers because it’s an aggressive little bastard—the first worm in years on a scale like Blaster. It has built-in p2p capabilities, and brute forces its way into open shared folders or printers, so it can crawl an office network quickly. It also piggybacks onto USB flash and hard drives. On top of all that, it’s designed to be incredibly resilient, killing security software, disabling Windows Update, and digging down deep.

The C release came out this past month. It doesn’t go after new machines—it’s actually a payload for computers already infected with B. It transformed Conficker from a sneezing pandemic into a seriously nasty plague. With C, its p2p powers are extended further, with digital code-signing, so it only accepts trusted code updates from itself. That means security experts can’t simply inject code to neutralize it. The patch also made Conficker better at killing security software. And it expanded the scope of the domains it tries to contact for instructions from 250 to 50,000, completely neutralizing security experts’ previous tactic of seizing the domains. There’s effectively no way to the cut the head off of this demon snake. The stage is set: On April 1, Conficker will reach out for the millions-strong zombienet’s next set of instructions.

So what will happen? Well, no one knows for sure. Conficker’s creator can do whatever he wants with his army. Launch massive denial-of-service attacks, setup the “Dark Google” syndicate, target millions of new machines, or generate a tidal wave of spam that’ll crash against servers all over the world.

Most likely though, Weafer told us, Conficker’s creator is motivated by money—they’ll rent it out. And if Conficker’s used as a massive doomsday tool, they’ll “quickly lose the ability to make money” with it. A low key operation harnessing the power of computers that are mainly located in developing nations may not have a big impact, though it would certainly set a terrible precedent: Whatever Conficker’s results, they will lead others to develop this idea in frightening new directions.

Conficker’s innovative approach that utilizes p2p, code-signing and a distributed domain setup will very possibly serve as inspiration to other malware writers, who Weafer said “you can bet” are watching Conficker’s success very closely, just as Conficker’s creators have clearly learned from past malware. It’s like evil open source.

That doesn’t mean April 1 will be a “digital Pearl Harbor.” If your machine is patched and up to date, the Microsoft Report’s Ed Bott tells us, you’ll probably be totally fine. And yes, you can get rid of it if you happen to be infected. There is an outside chance Conficker could turn into a massive parallel computer that borders on self-aware, come April 1, but more than likely, the day will come and go without you noticing anything weird, just some extra spam in your box for some V@ltr3xxx.

Still something you still wanna know? Send any questions about worms, V14GRA, or Jason Chen’s pants to tips@gizmodo.com, with “Giz Explains” in the subject line.

Develop Film in Coffee and Vitamin C

Mixdeveloper

It turns out that it’s possible to develop film in a mixture of instant coffee, washing soda and vitamin C. This is, to me, amazing. Here’s the recipe.

12 oz. water

5 teaspoons instant coffee crystals

3 1/2 teaspoons washing soda

1/2 teaspoon vitamin C powder

Dubbed cafenol (its a geeky photochem joke), the developer is used just like a regular developing solution, only you can make it by raiding the kitchen cupboard (apart from the instant coffee, of course. We know you all have French presses and espresso machines). You will still need a real fixer solution to deactivate the light sensitive materials, and you’ll need to take the same care in loading the film into a developing tank as you would if using regular ol’ Perceptol, but the results are surprisingly good.

Cafenol will turn any film into a black and white negative, similar in effect to cross processing (developing a slide film in color print film chemicals, for example), and you’ll still want to keep the extractor fan running. Despite the ingredients, this mixture is foul smelling. Photojojo:

Holy frijoles! How can things that smell like coffee, nothing, and nothing combine to smell like grim death?

Also, don’t drink it. One thing about this hack that isn’t surprising is that there is a Flickr group dedicated to cafenol photos. And it goes without saying that if you do try this at home, post your results to the Gadget Lab Flickr pool.

How to Develop Film Using Coffee and Vitamin C! Srsly! [Photojojo via Lifehacker]

Photo: Photojojo

Mac Mod Adds LCD Screen Behind Apple Logo

Don’t worry, we’re not about to bring you yet another hackintosh with a glowing Apple logo. This mod is altogether smarter and more elegant. It’s a real MacBook with another display within the Apple.

Eddie Zarick was actually responsible for the MSI Wind with a glowing logo we showed you last month. Since then, he’s been busy opening up his black MacBook and wiring a second LCD behind the Apple. This is recognized as a proper secondary display by the Mac and can therefore show anything.

The video starts out with screen saver but quickly gets more spooky when Ed switches on the iSight camera. It looks like there is a hole in the case when he starts waving — albeit a reversing, reducing hole, but still. Then the iTunes visualizer fires up and we realize the whole point of this hack. It might be pointless, but it looks amazing. Way better, in fact, than a stupid Splashtop weather widget.

Apple Glowing Logo as a Secondary Display with LCD! [MacMod Forum. Thanks. Eddie!]

See Also:

Almost Free Pinhole Digicam Hack

Pinhole_20090311

Over at Make, Jason Striegel explains how to turn your DSLR into a pinhole camera using "only need a few things: black paper, aluminum foil, a rubber band, and tape. Really, that’s it."

Apart from the camera itself, of course. The hack is about as simple as these things get — remove the lens, block the hole in the body with a piece of black card (with a hole pre-bored in the center) and cover with foil. Use a pin to punch a tiny hole in this piece of foil. Hey, it’s called a pinhole camera for a reason, OK?

That’s almost it. If your camera can’t take long exposures, set it to bulb (or "b") mode. This lets you hold the shutter release down to keep the shutter open. Striegel uses a ball of scrunched up foil and a rubber band to keep this in place.

Now, put the camera on a tripod or other steady base and take some pictures. You’ll get dreamy images with almost infinite depth of field due to the small aperture. The aperture also means exposures in the minutes, not seconds, of fractions thereof.

Try it out, and be sure to post the results to the Gadget Lab Flickr Pool. I’ll be making one this afternoon.

$0 digital pinhole camera [Make]

See Also:

Retro Bright Whitens Dirty, Yellowing Geek Toys

20090306_231807_2You don’t have to be a smoker to know the pain of yellowing hardware. Any beige box of a certain age starts to darken and stain like an Englishman’s teeth, turning beautiful retro hardware into the equivalent of a filthy, leering uncle, something to hide, not flaunt.

The reason? Retards. The ABS used for these old machines was rendered flame-retardant with chemical treatments. These chemicals are the ones which cause this unsightly yellowing and until now the only fix was an equally ugly coat of paint.

Retr0bright to the rescue! In a twisting story that started with German boffins and English Amiga nerds, it was eventually discovered that bromine was the yellowing agent, and UV light didn’t help either. The McGyver-esque answer is a mixture of hydrogen peroxide and a dash of commercial laundry booster "Oxy". Paint this on, stick the old computer out in the sun (or under a UV lamp) and several hours later you have a shiny white machine.

The folks at the Retr0bright project will sell you a gel, but if you actually own old hardware then its likely you’re a tinkerer already, in which case you can make your own. Full instructions are on the Retr0bright wiki, but the short recipe is this: Take a weak (10%) solution of hydrogen peroxide, add a dash of Oxy, apply and leave in the sun for an afternoon. That’s it.

Caution: Does not work on English teeth.

The “Retr0bright” Project [Retrobright via Lifehacker]

Chinese Hackers Reverse Engineer, Sell iTunes Gift Cards

Itunes_fake

Chinese hackers have managed to reverse-engineer the iTunes Gift Certificate algorithm and are knocking out knock-off cards and selling them cheap. In China, a $200 equivalent card can be had for just $3.

In a tribute to China’s healthy disregard for intellectual property (much like the policy in the US for the first 100 years of its life), these numbers are being traded on Taobao, the "Chinese Ebay". Buyers receive their codes via instant message, ready to be redeemed. Searching on the US Ebay site turns some codes up, too. According to Yahoo news, the going rate is around $40 for a $200 card.

Because the hackers appear to have discovered how to make genuine gift codes, the numbers are legitimate and cannot be distinguished from those blessed with Apple’s magic wand. Good news for the dodgy buyers, but bad news for real, honest customers: it’s entirely possible that the Chinese hackers could sell off a code that is already on a card in a store in the US, meaning the honest buyer will be left with an invalid certificate.

Not surprisingly, Apple is quiet on the matter. Expect to hear something when the company finds a fix. This could be tricky — the code generating algorithms could be changed, but that would leave a bunch of honest buyers with dead cards.

Hacked: $200 iTunes Gift Card for Only $2.60 [Yahoo News]

TV-B-Gone Creator Going Strong With Open-Source Hardware

Altman_brainmachine
SAN JOSE, Calif. — The creator of the TV-B-Gone, Mitch Altman, has turned his love of open-source electronic mayhem into a one-man business.

His website offers the basic TV-B-Gone, a $20 keychain device with a protruding LED that emits 140 different TV power-off codes, enabling it to shut down 98 percent of all televisions with the press of a single button, Altman says.

"The way I see it, it’s only fair," Altman says of his infrared light-emitting device. "If a TV shines light at me, I’ll shine a light at it. And if it stops shining light at me, I’ll stop shining light at it."

He also sells a $20 TV-B-Gone kit for do-it-yourselfers who want to assemble the parts themselves, and a $50 TV-B-Gone Pro that looks a bit like a chunky iPhone and has a range of 100 meters.

"I used it in the hotel lobby last night," Altman says. "I was trying to get some work done and there were four TVs on, with no one watching them. I aimed it at the two in front of me and all four turned off, that’s how powerful it is."

Altman’s invention, covered by Wired.com in 2004, achieved notoriety last year, when writers from Gizmodo used it to turn off dozens of displays at a time in the TV-saturated booths of CES 2008.

Afterwards, Altman says, he made $24,000 in new sales. "I called those guys to thank them personally," he says.

But business is, it seems, just a means for Altman to keep doing what he loves most: Hacking electronics. In a workshop Monday on how to build things with microcontrollers here at the Emerging Technology conference, Altman explained the basics of electronics while standing in front of a table littered with blinking, pulsing, glowing, beeping and whirring devices.

Many of his hacks, including the first versions of the TV-B-Gone, were built using the MiniPOV3 kit by hardware hacker Ladyada. That kit lets you create ghostly messages with a bank of 8 blinking LEDs, by waving the LEDs back and forth in the air.

By making changes to the kit’s circuitry, replacing the red LEDs with different colors and reprogramming the included microcontroller, Altman has made not only the TV-B-Gone, but also glowing lights that respond to hand gestures, an electronic "dog" that spins its tail in reaction to sunlight, a 3x3x3 cube of LEDs that displays abstract 3-dimensional patterns, and even a pair of glasses with embedded, flashing LEDs and a pair of headphones for getting your brain waves into a meditative state.

Altman is a fan of open-source hardware. The MiniPOV3 kit he uses is open source, and he recently released the schematics and code for his own projects as open source. Altman describes the decision to go open-source as a way of giving back to the hardware hacking community, which was already modifying and improving the TV-B-Gone.

"There are thousands of people who are incredibly intelligent and creative helping me, for free, and they love it," he says, describing the benefits of open source hardware.

He’s also helped found a hacker space in San Francisco, Noisebridge, where hardware hackers (or those who would like to learn more about hardware and software) can gather to work on their projects.

"I make enough money to live the life I want to live," Altman says. "And I love this life."

Photo: Mitch Altman wears the $35 Brain Machine he designed. Photo by Dylan Tweney / Wired.com