Friday, September 18, 2009

How to hack iPhone and iPod touch in 1st Step


How to hack iPhone and iPod touch in 1st Step

There are a lot of reasons to hack your iPhone or iPod touch.

There’s this myth that hacking will go away “once Apple adds that one killer feature.” But it’s unlikely, because the iPhone is unlike the earlier iPods or any phone on the market before it. It is a full-featured personal computer. The iPhone is a global device that uses the international standard GSM protocol. Unlocking the phone so that it can use SI M cards anywhere is a major industry, and will probably continue to be so even after Apple’s exclusive contracts with mobile carriers are gone. The iPod touch is the heir apparent of the iPod, and once flash memory sizes surpass hard drives, the iPod touch will be the iPod. But this iPod surfs the Web, gets email, and maps your location, and new applications are constantly being developed for it. The impulse to get the iPod—already the de facto standard MP3 player—to do even more is irresistible. No matter what Apple adds to its Software Development Kit (SDK), there will always be something important that they left out. It might just be the future killer application. And thus, the hacking community will continue to push the boundaries of what can be done with the phone. It’s important to realize that the iPhone is as powerful as a top-of-the-line late-’90s computer.Late-’90s computers were fast enough to use broadband and to fuel the first Internet boom. But this computer fits in a shirt pocket, and can be controlled with one finger. Now imagine a world where everyone is holding a broadband-connected, Unix-based personal computer in their hand.

0 comments:

Post a Comment

Related Posts with Thumbnails
 

Gadget Info Copyright © 2008 Black Brown Art Template by Ipiet's Blogger Template

ss_blog_claim=34e7f857cca430f180c85e72fafcfa1d ss_blog_claim=34e7f857cca430f180c85e72fafcfa1d