The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Main Page"
(New, nicer design. Revert if not liked, but I think its better and cleaner...) |
m |
||
Line 3: | Line 3: | ||
<!-- Added a split column information box- computid --> |
<!-- Added a split column information box- computid --> |
||
{{:Main Page/Welcome}} |
{{:Main Page/Welcome}} |
||
− | <table border=" |
+ | <table border="1" width="100%" style="background-color:orange;"><tr> |
<td style="background-color:orange; text-align:center; width:25%;"><b>[[Jailbreak iPhone2,1 / iPod3,1|Find bootrom exploit allowing unsigned code exec via USB (S5L8920+)]]</b></td> |
<td style="background-color:orange; text-align:center; width:25%;"><b>[[Jailbreak iPhone2,1 / iPod3,1|Find bootrom exploit allowing unsigned code exec via USB (S5L8920+)]]</b></td> |
||
<td style="background-color:orange; text-align:center; width:25%;"><b>[[Unlock 2.0|Break Chain of Trust (X-Gold 608)]]</b></td> |
<td style="background-color:orange; text-align:center; width:25%;"><b>[[Unlock 2.0|Break Chain of Trust (X-Gold 608)]]</b></td> |
||
Line 92: | Line 92: | ||
− | <table border=" |
+ | <table border="1" width="100%" style="background-color:orange;"> |
<tr> |
<tr> |
||
<td colspan="4" style="background-color:orange; text-align:center;"> |
<td colspan="4" style="background-color:orange; text-align:center;"> |
Revision as of 11:58, 8 November 2009
Find bootrom exploit allowing unsigned code exec via USB (S5L8920+) | Break Chain of Trust (X-Gold 608) |
Template:Col-begin Template:Col-2 Template:HeadingA
Template:Col-2 Template:HeadingB
iPhone
iPod Touch
Processors
- S5L8900 (iPhone, iPod Touch, iPhone 3G)
- S5L8720 (iPod touch 2G)
- S5L8920 (iPhone 3GS)
- S5L8922 (iPod Touch 3G)
- Baseband Device
Other
Template:Col-begin Template:Col-2 Template:HeadingA
Application Development
- Toolchain (Includes tutorials)
- Toolchain 2.0 (Includes tutorials)
- Frameworks
- MobileDevice Library
- Apple Certification Process
- Bypassing iPhone Code Signatures
- Distribution Methods
Application Copy Protection
- Copy Protection Overview
- Application Structure and Signatures
- Mach-O Loading Process
- Bugging Debuggers
- Defeating Cracks
Template:Col-2 Template:HeadingB
Guides
Definitions
|