Archive for the 'Stay Safe!' Category

Changing the root password on a jailbroken iPhone

Sunday, November 8th, 2009

This is a cached copy from cydia.saurik.com/password.html 0: Install MobileTerminal Package MobileTerminal Package 1: Run MobileTerminal This program will be on your SpringBoard are called "Terminal". 2: Obtain Administrator Access Run "su root" and provide the root password. The default password as provided by Apple is "alpine". Here I also run "cd" only to shorten […]

Malware Rickrolls jailbroken iPhones

Sunday, November 8th, 2009

Got a jailbroken iPhone? Then you need to read this: The first worm targeting Apple’s iPhone is alive and spreading in the wild. But most iPhone owners need not worry about it. The worm, known as Ikee, is, as worms go pretty harmless in that all it does is change the lock screen wallpaper to a picture of […]

Apple Ultracompact USB adapter exchange program kicks off today

Friday, October 10th, 2008

Back in September Apple announced a recall of the Ultracompact USB power adapter for the iPhone 3G following claims that the metal prongs might break off in the power outlet an present a risk of electrical shock. Well, today is the day that Apple kicks off the exchange program. Details here.

Attention VAIO TZ owners – Sony issues recall due to overheating

Thursday, September 4th, 2008

Important news for Sony VAIO TZ owners: Dear Valued Sony VAIO Customer, Sony takes pride in the quality of its products. Recently, we became aware of a potential issue affecting the following notebook PC models:  - VGN-TZ100 series  - VGN-TZ200 series  - VGN-TZ300 series  - VGN-TZ2000 series The issue involves a small number of units which may overheat […]

July’s Patch Tuesday

Tuesday, July 10th, 2007

Here's a the scoop on the patches released by Microsoft today: Critical: Microsoft Security Bulletin MS07-036Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (936542)This critical update resolves one publicly disclosed vulnerability and two privately reported vulnerabilities in addition to other security issues identified during the course of the investigation. These vulnerabilities could allow remote […]