All About Mobiles

http://www.infolinks.com/join-us?aid=2084565

How to Jailbreak Your iPod Touch 4G ios 6.0 Using RedSn0w (Mac)



Step One
Create a folder on your desktop called Pwnage

Download the latest version of RedSn0w from here and place it in the Pwnage folder. Likewise, download the 6.0 firmware from here and place it in the Pwnage folder. (Note: you do not need to download the 6.0 firmware if you are already on iOS 6.0)

Extract the RedSn0w zip file by double clicking it.


Step Two:
If you haven't already updated to iOS 6 then open iTunes from your dock.


Select your iPod from the list of devices on the left. Now hold down Option and click the Restore button. Restore is preferred as it won't create any wasted space on your iPod.


Navigate to the Pwnage folder on your desktop and select the 6.0 firmware ipsw. Click the Choose button to continue.


iTunes will now update your iPod to the new firmware.

Step Three
Right click or control-click the redsn0w application from the redsn0w folder we extracted earlier and choose Open from the popup menu that appears.




Step Four
Once RedSn0w opens ensure your device is connected and click the Jailbreak button


Step Five
Turn OFF your device then click the Next button


Step Six
RedSn0w will now guide you through the steps to get into DFU mode. You can find more help with DFU mode here.


Hold down both the Home button and the Power button for 10 seconds.


Release the Power button and continue holding the Home button until RedSn0w detects the device.


Step Seven
Your iPod will now be exploited with limera1n.


Step Eight
RedSn0w will now prepare the jailbreak data.


Step Nine
Select Cydia from the list of options and click Next.


Step Ten
Your iPod will now be rebooted again and RedSn0w will begin uploading the new RAM Disk and Kernel.


Step Eleven
Once this is complete you will be notified that RedSn0w is done and that this is a tethered jailbreak.





BOOT TETHERED
Once you have jailbroken you will need to rerun redsn0w to boot tethered.

Step One
From the main RedSn0w menu click the Extras button.


Step Two
Select Just boot from the Extras menu to boot tethered and follow the instructions to put your device into DFU mode again for boot.



done;.

jailbreak

jailbreak

redsnow

 
 

--------------------------------------------------------------------------------------------------------------

     
 
 
 
 
 
 

How to Downgrade Your iPad 2 From iOS 6.x to iOS 5.x (Mac)

 Step One
Create a folder on your desktop called Pwnage

Download the latest version of RedSn0w from here and place it in the Pwnage folder. Likewise, download the 5.x firmware you would like to restore to and the 4.x firmware you have saved SHSH Blobs for from here and place it/them in the Pwnage folder.

Extract the RedSn0w zip file by double clicking it.


Step Two
Right click or control-click the redsn0w application from the redsn0w folder we extracted earlier and choose Open from the popup menu that appears.





Step Three
Click Extras from the main menu.


Step Four
Click Even More from the Extras menu.


Step Five
Click Restore from the Even More menu.


Step Six
Click IPSW from the Restore menu, choose the IPSW you would like to restore to from the window that appears, and click Open.




Step Seven
When prompted, connect your iPad 2 to the computer in normal mode and click OK


Step Eight
You will be informed that a 4.x IPSW will be required to continue. Click the OK button.


Step Nine
Select the 4.x firmware IPSW from the Pwnage folder on your desktop and click Open.


Step Ten
Your iPad will now be placed into recovery mode.


Step Eleven
RedSn0w will check Cydia to see if you have the correct blobs saved.

If RedSn0w is unable to find your blobs automatically click the Remote button to try again or you can click the Local button to search for blobs on your computer.


Step Twelve
RedSn0w will prepare the 4.x restore image.


Step Thirteen
You will then be prompted to place your iPad into DFU mode. You can find more help with DFU mode here.


Hold down both the Home button and the Power button for 10 seconds.

Release the Power button and continue holding the Home button for another 10 seconds. You screen should stay blank.

Click the OK button to continue.

Step Fourteen
RedSn0w will now restore to iOS 4.x.


Step Fifteen
Once the restore to iOS 4.x is complete, RedSn0w will put your device back into recovery mode and prepare the iOS 5.x restore image.


Step Sixteen
iOS 5.x will now be restored.


Step Seventeen
You'll be notified once the restore is complete....

How to Read Forgotten Android lock XT Pattern Lock

HOW TO READ FORGOTTEN ANDROID LOCK XT PATTERN LOCK & WRITE NEW PATTERN LOCK


 


  • Browse Folder - var/mobile/library/preferences/
  • There one File ( com.zmaster.AndroidLock.plist )
  • Open this File With Notepad
  • Find there like This words <string>7416852369</string>
  • This Numbers your patern
  • And you can change here your pattern
  • Done Enjoy.......

i phone firmware

 

Download iPhone Firmware Files

 

 

 



Download iPad Firmware Files


 

 

 

 


Download iPad Firmware Files



 



 



 


MXBOX/HTI v3.5 revision 2.5 -Download

v3.5 revision 2.5, Public-Release

HTI ONLINE SERVICES module updated to version 2.1
- [IPHONE_CHECK] added dialog message on specific events (license expired, blocked ...)
- [IPHONE_FU] countries and carriers are now sorted
- improvements to the current systems

Some more news for HTI ONLINE SERVICES

- USA AT&T - REDUCED price consumption

- CANADA TELUS - REDUCED price consumption

- DENMARK TELENOR - REDUCED price consumption



NOKIA module updated to version 2.5
- added: XG223 phones(new Asha series) support by USB (mode: Nokia Suite)
- Normal USB(Nokia Suite) and DEAD USB(Nokia USB ROM) flashing supported
- Legacy RPL(IMEI,CCC,HWC,SIMLOCK) backup/restore supported
- added latest flash update v 12.33.000.3 to setup
- minor bugfix

FIRE module updated to version 1.4
- added: Nokia schematics and SM download menu

Common changes:
- improved internal download task routine(random stop bugfix)
- minor bugfix and improvements



BUS CHECK LOG:

Code:
Make sure USB cable, Battery and charger are removed from device.
Insert USB cable, Battery back to device(make sure to have fully charged battery).
Insert Charger or Press phone's power button(if flashing doesnt start automatically)
Waiting for USB ROM device ...
Device connected: nmwcdnsucx64\Nokia USB Flashing Generic, PORT_ID: 11DB3447
CMT SYSTEM ASIC ID: 00000C201610004049922C09A2E184848332F200 [XGOLD 223]
CMT PUBLIC ID: A8222DC55C56BB0F49922C09A2E184848332F200
CMT ASIC MODE ID: 00
CMT ROOT KEY HASH: 125FC72605B5C4E48A9E0225084D2579
CMT ROM ID: 535882252F54C676
Loading CMT secondary boot code
SecondaryBoot: XG223_v11_usb2nd.fg [XG223] version: 12.30.1 revision: 4.0 size: 0x59C0
Supported Ids: 00000C2016000040, 00000C2016100040
Secondary boot loaded.
Loading CMT update server data
Algorithm: XG223_v11_usbalg.fg [XG223_V0 ALG] version: 12.30.1 revision: 4.0 size: 0x32338
Supported Ids: 00000C2016000040, 00000C2016100040
Update server code loaded.
Initializing Update Server ...
Configuring Algorithm clients...
FUR: Adding Asic CMT as client OK.
CMT PAPUBKEYS HASH: 42E7CDDAAE2ACD72926AC996E98AEC576D7840C3
Selected firmware certificate matched.
Original Imei: 35284105154390
Original Product code: 059N975
Bluetooth ID: C83D97676FA6
SIMLOCK PA identifier:
[0] PA_SIMLOC30

Reading CMT NPC (0x190 bytes).
Reading CMT VARIANT (0x0 bytes).
Reading CMT CCC (0x204 bytes).
Reading CMT HWC (0xD4 bytes).
Reading CMT R&D (0x0 bytes).
Reading CMT MDM_KEYS (0x0 bytes).
Reading CMT PARTNERC (0x0 bytes).

Waiting for device boot up ...
Device connected: nmwcdc\Nokia USB Phonet, PORT_ID: 97BB22D
Verifying communication to device OK.

Phone type: RM-843 (Nokia 309)
SW version: V 05.85 23-10-12 RM-843 (c) Nokia
Imei plain: 352841051xxxxx-9
Product code: 059N975
Battery voltage: 4073 mV, current: 93 mA
Language Pack:
- not available.
SLPA ver[5]: PA_SIMLOC30 (20 digit NCK)
warning: avoid SW Downgrade & manual erase to this phone !
Camera config: 115B6002005006, ver:

SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST passed


Imei net: 352841051xxxxxx
Version: SIMLOCK SERVER
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK1: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK2: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK3: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK4: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK5: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK6: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK7: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN


FLASHING LOG:

Code:
Processing MCU file: rm843__05.85.mcusw 
[XG223,XG223_V0 ALG] size: 28.91 MB
Supported Ids: 00000C2016100040
NOR page size in the phone is 128 K.
Battery voltage: 4049 mV
Waiting for USB device removal ...OK
Waiting for USB device arrival ...OK
CMT SYSTEM ASIC ID: 00000C201610004049922C09A2E184848332F200 [XGOLD 223]
CMT PUBLIC ID: 0000000000000000000000000000000000000000
CMT ASIC MODE ID: 00
CMT ROOT KEY HASH: 00000000000000000000000000000000
CMT ROM ID: 535882252F54C676
Using default Root Hash for XG223.
Loading CMT secondary boot code
SecondaryBoot: XG223_v11_usb2nd.fg [XG223] version: 12.30.1 revision: 4.0 size: 0x59C0
Supported Ids: 00000C2016000040, 00000C2016100040
Secondary boot loaded.
Loading CMT update server data
Algorithm: XG223_v11_usbalg.fg [XG223_V0 ALG] version: 12.30.1 revision: 4.0 size: 0x32338
Supported Ids: 00000C2016000040, 00000C2016100040
Update server code loaded.
Initializing Update Server ...
Configuring Algorithm clients...
FUR: Adding Asic CMT as client OK.
CMT PAPUBKEYS HASH: 42E7CDDAAE2ACD72926AC996E98AEC576D7840C3
Storing certificate [NPC, CCC, HWC, R&D] ...OK
Erase size: 38.87 MB
CMT FLASH,NOR area [40000000-4003FFFF]
CMT FLASH,NOR area [47E00000-47E3FFFF]
CMT FLASH,NOR area [400A0000-4251FFFF]
CMT FLASH,NOR area [42520000-4261FFFF]
CMT FLASH,NOR area [47E40000-47F1FFFF]
Flash programming ...
CMT ISSW block sent
CMT MEMSET block sent
CMT PRIMAPP block sent
CMT LOADER block sent
CMT PASUBTOC block sent
CMT PAPUBKEYS: 42E7CDDA [] sent
CMT UPDAPP block sent
CMT MCUSW block sent
Programming completed in 19.158 s
Processing PPM file: rm843__05.85.ppm_x
[XG223,XG223_V0 ALG] size: 7.31 MB
Supported Ids: 00000C2016100040
Erase size: 9.87 MB
CMT FLASH,NOR area [42620000-42FFFFFF] erased in 0.001 s
Flash programming ...
Programming completed in 4.324 s
Processing CNT file: rm843__05.85.image_x_059P061
[XG223,XG223_V0 ALG] size: 43.38 MB
Supported Ids: 00000C2016100040
Erase size: 78 MB
CMT FLASH,NOR area [43000000-47DFFFFF] erased in 0.007 s
Flash programming ...
Programming completed in 26.955 s
Total time for flashing process(boot+erase+write) was 53.379 s
Waiting for device boot up ...
Device connected: nmwcdc\Nokia USB Phonet, PORT_ID: 97BB22D
Verifying communication to device OK.


Phone type: RM-843 (Nokia 309)
SW version: V 05.85 23-10-12 RM-843 (c) Nokia
Imei plain: 352841051xxxxx-9
Product code: 059N975
Battery voltage: 4054 mV, current: 136 mA
Language Pack:
- not available.
SLPA ver[5]: PA_SIMLOC30 (20 digit NCK)
warning: avoid SW Downgrade & manual erase to this phone !
Camera config: 115B6002005006, ver:

SIMLOCK seems to be valid
SUPERDONGLE_KEY seems to be valid
SIMLOCK_TEST passed
SECURITY_TEST passed

Imei net: 352841051xxxxxx
Version: SIMLOCK SERVER
Counter: 0/3, 0/10

CONFIG_DATA: 2440700000000000
PROFILE_BITS: 0000000000000000

BLOCK1: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK2: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK3: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK4: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK5: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK6: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN
BLOCK7: 1=OPEN, 2=OPEN, 3=OPEN, 4=OPEN, 5=OPEN


DOWNLOAD LINK MXBOX v3.5 revision 2.5, Public-Release

All About Mobiles Headline Animator

Related Posts Plugin for WordPress, Blogger...
FeedReader button