Apple on Thursday launched an online directory of more than 200 Web applications built to run in the iPhone's Safari browser.
The applications are organized in categories such as the most recent viewed, most popular, alphabetical and staff picks. The featured Web software on Thursday was a Facebook application that connects the iPhone to the popular social network in order to visits friends' pages, upload and share photos, or send and receive messages.
Just two days after reporting preliminary success in opening iPhones updated to firmware 1.1.1, the iPhone Dev Team has published a process for getting around Apple's updates to jail break an iPhone and install non-Apple applications. The process involves downgrading the iPhone to version 1.0.2, patching it, upgrading, and patching again. If you think that sounds convoluted, you're right. The hacking process is somewhat convoluted and is definitely not for the faint of heart.
Apple Inc. has halted shipments of MagSafe power adapters for its MacBook Pro notebook line as a result of quality design issues and is presently working on a fix, AppleInsider has been told.
Several people familiar with the matter say the Cupertino-based firm began pulling inventory of the 85W power supplies from its retail stores a few weeks ago. Those same people say Apple also discontinued shipments to third party retailers ahead of "redesigned" models that are expected to ship sometime later this month of early next.
The Finder in Mac OS X has long been reviled as the most glaring problem in the system, earning it the "Fix the F-ing Finder" meme. Apple has significantly updated the Finder for Mac OS X 10.5 Leopard, introducing some things old, some things new, some things borrowed, and, well, the icon is still blue. Here's a look at what's new.
The Finder's Origins
It appears Niacin from the devteam has successfully managed to get the TIFF exploit working and has confirmed that the attack vector works for the iPhone 1.0.2, 1.1.1 and the iPod Touch 1.1.1. From his blog:
Using the tiff exploit, we have managed to expose the root parition via the symlink hack. We have verified the exploit with an iphone 1.0.2,1.1.1 and itouch 1.1.1
We are currently working on remounting the / parition rw and we will be hosting the exploit on this site SOON.
Check back and don't forget to donate!!!!