Selasa, 22 Maret 2011

iOS 4.3 vs Android 3.0 Honeycomb



Apple iOS 4.3 vs. Android 3.0 Honeycomb, do you think it is a provocative title? Why not? This can be your main guide to show you which one is the software to meet your requirements and works very well because of its strong and powerful performance.

Each platform has some interesting updates, but comparing the two platforms let us know it the Android 3.0 is an actual tablet-centric OS, while iOS 4.3 shows its enhancement from the original iPad experience.

Browsers
The iOS has ‘Nitro’ Javascript engine, giving a boost to online use and double the power in version 4.2.1. In addition, there will be improved browser and web application performance.

Android Honeycomb has done so many improvements that are considerable because of the real efforts made. The additional features grabbed from Chrome are there, including tabbed browsing. Android also supports Javascript and plug-ins, along with the zoom and scroll functions that have been improved.


Social Network
In comparison the two platforms are fairly equal because each gives us contact integration with Facebook, Twitter and other native social networking apps, along with standing features which are enhanced from previous versions. The iOS 4.3 even has Location Services receiving a revamp and runs quickly accessible in the Settings menu. The iOS 4.3 has new Find My Friends, attacking what Android has established Google Latitude.

Apps Media
Apple has developed AirPlay, a new tech of Apple’s wireless media streaming allowing users to virtually stream real-time video, audio and photo images direct to Apple TVs. Even the iOS 4.3 version is able to run streaming of web-based H.264 videos.

iOS 4.3 will also allow you to stream your self-made videos straight from your device. You would just need to transfer the video to a computer and synchronize it, but now Apple has eliminated the fuss.

Talking about multitasking capability, showing us the two platforms give us a great progressive strength, particularly Android. Honeycomb is a good luck because of its quick and user-friendly apearance. Users will not only be capable of operating high-end apps and content, but also get an integrated OpenGL graphics acceleration. The Renderscript 3D graphics engine is developed as well.

Compatibility
One of the Android’s weaknesses is about its problem of fragmentation across devices. Google is always seeking to improve it with future versions, but the older devices of the platform will be still locked.

Apple has a better iOS because of its compatibility, and it might be caused by its “seniority” compared to Android.

Interface
iOs has been changed a bit while we have a look at the original iPad. Its new multi-touch function presents the best touchscreen display for users, as consequence they can use their four and five finger gestures.

Something new also comes to the current application and the homescreen. The replacement of the screen-Lock appears with the Mute switch, and the iOS 4.3 offers a toggle allowing users to choose which function to use it for.

On the other hand, Android reveals it in the interface users will also find Native google apps, such as Gmail, which is close to what Apple has made with its presentation as its parts of the extensive enhancements with new features. There are applications and notifications bar at the bottom of the homescreen. And thus, you can navigate through currently open apps.

Most of all, the big thing to keep in mind about Android is its inherent customization it has over most other platforms.

Conclusion
We see that improvements made in iOS 4.3 are cool. All cases and problems that need to be improved are resolved very well. However, we would still find difficult to turn our heads because Android is now much more competitive. Android is more customizable over intuitiveness, easy to use and integration. All in all, Android Honeycomb is more impressive and surprising, while iOS didn’t make many changes compared to the Honeycomb.
Continue reading →

Cyclone Box v1.57 1st in world ORIGINAL RPL BACKUP and SD BACKUP for RAPU/RAP4/RAPID

New firmware for CycloneBox is Available.
  • - Added PM308 decryption for NEW phones (RAPU , RAP3Gv4, RAPIDO New ), that means you can:
  • - Superdongle Key backup
  • - CMLA Key backup
  • - Correct Phone Security Analysis for this phones
  • - Correct MCU/DSP timestamps analysis
  • - Phone auhtorization without corrupting SD key, when SD key is correct
  • - After local SX4 auth , phone STILL MIGHT BE authorized with ORIGINAL NOKIA SX4 CARD
  • - Created RPL from RAPU/RAP4 phones are now 100% like delivered from Nokia! That means after full erase and writing back backed-up RPL, your phone STILL MIGHT BE AUTHORIZED WITH ORIGINAL SX4 CARD - no security issues !
  • - Created RPL from RAPU phones might also SAVE PHONE from DESTROYING by some other tools (Contact Service after upgrade to latest versions...)
  • - Minor changes and bugfixes

NOTE

This is firmware-side update only, upgrade your box firmware to v1.57 and use latest installer v1.12


Created RPL with FULL NOKIA CONTENT (SD, CMLA, ...)
Code:
RPL Creation started...
Processing CMT Part...
Storing Product Code...
Storing PSN...
Storing HWID...
Trying to store Simlock...
Reading Configuration Key...
Hashing...
Reading SHA1-RSA Signature...
Reading SHA1-HMAC Signature...
Storing Simlock...
Trying to store WMDRM RPL...
Reading Keys...
Storing WMDRM PD...
Reading Security Block...
Security block OK and saved to "RM-469_355216039314532_2011-03-10_130535.SecurityBlock.PM"
"1BB0020A296303443292389F545846C201100A5C.C0003160 " Exists, That is good...
Storing Additional Data...
Checking Superdongle Key...
Encrypting Superdongle Key...
Storing Superdongle Key...
Checking CMLA Key...
Storing CMLA Key...
Booting CMT...
CMT_SYSTEM_ASIC_ID: 000000030000022600010007600C192102011104
CMT_EM_ASIC_ID: 00001040
CMT_EM_ASIC_ID: 00001030
CMT_PUBLIC_ID: 1BB0020A296303443292389F545846C201100A5C
CMT_ASIC_MODE_ID: 00
CMT_ROOT_KEY_HASH: 25B977A055BE9B5DEC0C38A2A279C695
CMT_BOOT_ROM_CRC: 3E273BF6
CMT_SECURE_ROM_CRC: 37BE26FA
CMT Ready!
Searching for BootCode: DualLine 32Bit
RAPUv11_2nd.fg, Type: 2nd Boot Loader, Rev: 768.10.48.1, Algo: BB5
Flashbus Write baud set to 1.0Mbits
Flashbus Read baud set to 98Kbits
Using NEW BB5 FLASHING PROTOCOL
Default Transmission Mode Requested by Loader: Dual Line, 32 bit, Overriding
Transmission Mode Requested: Dual Line, 32 bit, Accepted: Dual Line, 32 bit
Box TX2 Data Pin set to: Service Pin 3
FlashChip[0,CMT]: 0x0000000000000000, Unknown, RAM
FlashChip[0,CMT]: 0xFFFF000000000000, Unknown, MMC
FlashChip[0,CMT]: 0x0020004000000031, ST, NOR
FlashChip[1,CMT]: 0x0000000100000000, Unknown, NOR
FlashChip[0,CMT]: 0x0020004000000031, ST, ONENAND
Requested Algorithm: XSR 1.6 (CMT)
Searching for BootCode: DualLine 32Bit
FlashChip 0x00200040 (ST), Size: 256MBytes, VPP: Not Supported
FlashChip 0x00200040 (ST), Size: 256MBytes, VPP: Not Supported
RAPUv11_XSR17_alg.fg, Type: Algorithm, Rev: 768.10.48.1, Algo: XSR 1.6
Initializing TurboCache...
TurboCache Loaded!
Writing CMT PASUBTOC Certificate...
Writing CMT ALG Certificate...
CMT Algorithm Ready!
Default Transmission Mode Requested by Loader: Dual Line, 32 bit, Overriding
Transmission Mode Requested: Dual Line, 32 bit, Accepted: Dual Line, 32 bit
Box TX2 Data Pin set to: Service Pin 3
Adding FUR Client (CMT, State: Ready)...
CMT FUR Ready!
Box VPP disabled
Internal CMT Phone VPP Enabled
PAPUBKEYS Hash for CMT: 85F252E351E225CAFC4DFBC8041EABD2823E3500
APE Subsystem Not Found
Flashbus Write baud set to 5.0Mbits
Storing NPC...
Storing CCC...
Storing HWC...
CMT VARIANT Not Found
Restarting MCU...
RPL Saved OK

Example seccurity analysis, timestamp analysis, etc for RAPU

Code:
Started Reading MCU & DSP Timestamps...
MCU Version V ICPR82_09w46.8
MCU Date 30-03-10
Product RM-469 (Nokia E52)
Manufacturer (c) Nokia
IMEI 355216039314532
Mastercode 2637612627
Reading Security Block...
Security block OK and saved to "RM-469_355216039314532_2011-03-10_130314.SecurityBlock.PM"
"1BB0020A296303443292389F545846C201100A5C.C0003160 " Exists, That is good...
Booting CMT...
CMT_SYSTEM_ASIC_ID: 000000030000022600010007600C192102011104
CMT_EM_ASIC_ID: 00001040
CMT_EM_ASIC_ID: 00001030
CMT_PUBLIC_ID: 1BB0020A296303443292389F545846C201100A5C
CMT_ASIC_MODE_ID: 00
CMT_ROOT_KEY_HASH: 25B977A055BE9B5DEC0C38A2A279C695
CMT_BOOT_ROM_CRC: 3E273BF6
CMT_SECURE_ROM_CRC: 37BE26FA
CMT Ready!
Searching for BootCode: DualLine 32Bit
RAPUv11_2nd.fg, Type: 2nd Boot Loader, Rev: 768.10.48.1, Algo: BB5
Flashbus Write baud set to 1.0Mbits
Flashbus Read baud set to 98Kbits
Using NEW BB5 FLASHING PROTOCOL
Default Transmission Mode Requested by Loader: Dual Line, 32 bit, Overriding
Transmission Mode Requested: Dual Line, 32 bit, Accepted: Dual Line, 32 bit
Box TX2 Data Pin set to: Service Pin 3
FlashChip[0,CMT]: 0x0000000000000000, Unknown, RAM
FlashChip[0,CMT]: 0xFFFF000000000000, Unknown, MMC
FlashChip[0,CMT]: 0x0020004000000031, ST, NOR
FlashChip[1,CMT]: 0x0000000100000000, Unknown, NOR
FlashChip[0,CMT]: 0x0020004000000031, ST, ONENAND
Requested Algorithm: XSR 1.6 (CMT)
Searching for BootCode: DualLine 32Bit
FlashChip 0x00200040 (ST), Size: 256MBytes, VPP: Not Supported
FlashChip 0x00200040 (ST), Size: 256MBytes, VPP: Not Supported
RAPUv11_XSR17_alg.fg, Type: Algorithm, Rev: 768.10.48.1, Algo: XSR 1.6
Initializing TurboCache...
TurboCache Loaded!
Writing CMT PASUBTOC Certificate...
Writing CMT ALG Certificate...
CMT Algorithm Ready!
Default Transmission Mode Requested by Loader: Dual Line, 32 bit, Overriding
Transmission Mode Requested: Dual Line, 32 bit, Accepted: Dual Line, 32 bit
Box TX2 Data Pin set to: Service Pin 3
Adding FUR Client (CMT, State: Ready)...
CMT FUR Ready!
Box VPP disabled
Internal CMT Phone VPP Enabled
PAPUBKEYS Hash for CMT: 85F252E351E225CAFC4DFBC8041EABD2823E3500
APE Boot skipped on user request
Flashbus Write baud set to 5.0Mbits
Reading MCUSW...
Reading DSP0...
Restarting MCU...
------ SECURITY BLOCK TIMESTAMPS ------
Timestamp Slots Detected: 4
Timestamp[1] "AENO", 2010-02-19 11:11:38
Timestamp[1] Hash "0BCD489612D4A4968B4D42A5631FC85C5D7E0E81"
Timestamp[1] Factory MCUSW Timestamp 1970-01-01 02:00:00
Timestamp[1] Dejan Hack Detected
Timestamp[1] ValidAfter Factory MCUSW Test Passed OK!
Timestamp[2] "CMCU", 2010-04-02 11:57:08
Timestamp[2] Hash "4CC50641D7C45E9DFE2967D4802C8710547BF54A"
Timestamp[2] Factory MCUSW Timestamp 2009-09-02 15:18:02
Timestamp[2] ValidAfter Factory MCUSW Test Passed OK!
Timestamp[3] "CDSP", 2010-04-02 11:57:07
Timestamp[3] Hash "D8C94BFA607710D856D8C78A9CE3EB411CD7AC4C"
Timestamp[3] Factory MCUSW Timestamp 2009-09-02 15:18:02
Timestamp[3] ValidAfter Factory MCUSW Test Passed OK!
Timestamp[4] "AMCU", 2010-04-02 11:57:09
Timestamp[4] Hash "BFC854388C2C26014F05B5084A8033CB30E472EB"
Timestamp[4] Factory MCUSW Timestamp 2009-09-02 15:18:02
Timestamp[4] ValidAfter Factory MCUSW Test Passed OK!
-------------------------------------
------ ACTUAL FLASH TIMESTAMPS ------
MCUSW Timestamp 2010-04-02 11:57:08
Flash MCUSW Timestamp synchronized with Security Block MCUSW Timestamp OK!
DSP Timestamp 2010-04-02 11:57:07
Flash DSP Timestamp synchronized with Security Block DSP Timestamp OK!
-------------------------------------
Finished, MCU and DSP Timestamps looks good!
Started Phone Security Analysis...
MCU Version V ICPR82_09w46.8
MCU Date 30-03-10
Product RM-469 (Nokia E52)
Manufacturer (c) Nokia
IMEI 355216039314532
Mastercode 2637612627
Reading Security Block...
Security block OK and saved to "RM-469_355216039314532_2011-03-10_130516.SecurityBlock.PM"
Step 1 : Testing SIMLOCK
SIMLOCK SEFLTEST PASSED OK!
Step 2 : Testing SECURITY
SECURITY SEFLTEST PASSED OK!
Step 3 : Analyzing Security Block
"1BB0020A296303443292389F545846C201100A5C.C0003160 " Exists, That is good...
Checking SUPERDONGLE...
SUPERDONGLE FOUND AND CHECKSUM OK! PASSED!
Checking SIMLOCK...
Failed to decode Security Section, Box Reported: Security Section Not Found (SL3 phone?)
Checking MCU&DSP TIMESTAMPS...
MCU&DSP TIMESTAMPS FOUND AND CHECKSUM OK! PASSED!
Checking CMLA KEYS...
CMLA KEYS FOUND AND CHECKSUM OK! PASSED!
Checking ECC KEYS...
ECC KEYS FOUND AND CHECKSUM OK! PASSED!
Checking DIV KEYS...
DIV KEYS FOUND AND CHECKSUM OK! PASSED!
Analyze finished!


Best Regards,
Cyclone Team
Continue reading →

Public discussion about Fenix Key SL3 Unlocker (SLAP)

Fenix Key SL3 SLAP Client v1.0

FOR FREE !!! NO LOGS, NO ACTIVATIONS - dont waste your money !!!

Features:

- Supported UFS & JAF interface
- Whole application is split into server and client, then you can put server for example in home and connect into it from any place
- No calculation power wasting, you can give access into server for customers\friends by simple create account with password and any amount of logs inside as you want

Supported hashes:

38F312750F686F9FC9B1B3778774A195
9A28E119033B91D14D22838C86D0D53C
9DDBFCFE6E73CED7D8C6268C8EB85723
A5404AE83A594ECADEE532F0C236BFA6
BAF3A9C3DBFA8454937DB77F2B8852B1
CAEEBB65D3C48E6DC73B49DC5063A2EE
E9EFF4BFAA5393217CA6B17755FC3E14
F2D76DFAFD66C7F195F278417DF05888
F682624FFB08F6D955DBE7D9C0485084
FCB5C510AF7F09F313D9BDE85A707CC0


Supported models:

2690 (RM-635)
2700 Classic (RM-561)
2700c-2 (RM-561)
2730 Classic (RM-578)
2730c-1b (RM-579)
3600 Slide (RM-352)
3720 Classic (RM-518)
3720c-2 (RM-518)
5130 (RM-495)
5130c-2 (RM-495)
5130 XpressMusic (RM-495)
5310 XpressMusic (RM-303)
5730s (RM-465)
5730s-1 XpressMusic (RM-465)
5800d-1 (RM-356)
6300 (RM-217)
6303 Classic (RM-443)
6500 Slide (RM-240)
6500 Classic (RM-265)
E63 (RM437)
E71-1 (RM-346)
N97-1 (RM-505)
N97-1 N97i (RM-505)
N97-3 (RM-507)
N97-4 (RM-555)
N97-4 mini (RM-55)


1. Required hardware: ATI Radeon HD 5xxx or Nvidia CUDA graphic card
2. Recommended hardware: HD 5850, HD 5870 or HD 5970
3. High hardware system: TWO Dual HD 5970


Note:
On Nvidia CUDA GPU graphic cards, price of card over performance is not the best one, so we NOT recommend to use Nvidia CUDA cards.
But, if you have to much money and want to throw away some money,
our software also support this cards too.


About Bruteforce Unlocking times (this is a typical time, please do not take this as constant time):

ATI HD 5850: ~55 hours
ATI HD 5870: ~43 hours
ATI HD 5970: ~24 hours
Dual ATI HD 5970: ~12 hours

Now, with SL3 Local Bruteforce and Fenix Key, Time Control is IN YOUR HANDS. Of course, depends on how many phones you have to unlock and how much you want to spend on hardware.

Link Here..
http://forum.gsmhosting.com
Continue reading →

MXKEY FREE Dejan SL3 file converter, FREE SL3 Code calculation after brute force.

Since Dejan tool is not all free and the logs file can be calculated ONLY with his server,
here is the rest of it what you all need it to be TOTALY FREE.

And one more gift for all my friends who made own GPU for Brute Force.

ORIGINAL POST:
FREE Dejan SL3 logger file converter, FREE SL3 Code calculation after brute force.

Let's start the HOT and "ATOMIC" summer of MXKEY with some FREE gifts

BR,
Manole
Continue reading →

How to Fix iPhone 4 iOS 4.3 Battery Drain

As I reported you yesterday about the problem which faced some problems with battery life after upgrading to iOS 4.3, our reader has sent a new method to stop the battery drain.




First method to stop iOS 4.3 Battery life problem:

Battery life should be restored to what they were before the latest update. Precisely, it's the notification system in Ping.

Go to Settings > General > Restrictions and select Enable Restrictions. You will see Ping setting whereby you can click on the switch to disable it. This will save 2 hours for your iOS device


Second method to stop iOS 4.3 Battery life problem (use if the first method didn't solve your problem):
Go to Setting > General > Reset > Reset Network Settings.
Continue reading →

Mac OS X 10.6.7 Released, Download Now

Apple has just released new update to Snow Leopard Mac OS X 10.6.7 which brings a number of fixes. The new update is recommended for all users running Mac OS X Snow Leopard .


The 10.6.7 Update is recommended for all users running Mac OS X Snow Leopard and includes general operating system fixes that enhance the stability, compatibility, and security of your Mac, including fixes that:

- Improve the reliability of Back to My Mac
- Resolve an issue when transferring files to certain SMB servers
- Address various minor Mac App Store bugs

For detailed information on this update, please visit this website: http://support.apple.com/kb/HT4472.
For information on the security content of this update, please visit: http://support.apple.com/kb/HT1222.
Download Mac OS X v10.6.7 Update
Continue reading →

Senin, 21 Maret 2011

Gevey SIM can unlock iPhone 4 on Baseband 2.10.04 / 3.10.01 ! Confirmed !

Guys over RedmondPie has just got some exclusive screenshots of unlocked iPhone 4 on baseband 02.10.04 running T-Mobile network. This iPhone 4 is unlocked by Gevey SIM which was announced few days ago.


Gevey SIM for iPhone 4 basically works by forcing the activation of the baseband using the emergency dialer, and it is also said to be vulnerable up to iOS 4.3. In case you want to get a one, you can navigate here and read more about it.

We totally advice and recommend you wait for a legal iPhone 4 unlock from the iPhone Dev Team which will be possible soon thanks to the 40-bit NCK exploit for iPhone 4.

Here's a video in action:

Continue reading →