iPhone Hacks

iPhone Hacks
Author: David Jurick
Publisher: "O'Reilly Media, Inc."
Total Pages: 484
Release: 2009-04-02
Genre: Computers
ISBN: 0596555687

With iPhone Hacks, you can make your iPhone do all you'd expect of a mobile smartphone -- and more. Learn tips and techniques to unleash little-known features, find and create innovative applications for both the iPhone and iPod touch, and unshackle these devices to run everything from network utilities to video game emulators. This book will teach you how to: Import your entire movie collection, sync with multiple computers, and save YouTube videos Remotely access your home network, audio, and video, and even control your desktop Develop native applications for the iPhone and iPod touch on Linux, Windows, or Mac Check email, receive MMS messages, use IRC, and record full-motion video Run any application in the iPhone's background, and mirror its display on a TV Make your iPhone emulate old-school video game platforms, and play classic console and arcade games Integrate your iPhone with your car stereo Build your own electronic bridges to connect keyboards, serial devices, and more to your iPhone without "jailbreaking" iPhone Hacks explains how to set up your iPhone the way you want it, and helps you give it capabilities that will rival your desktop computer. This cunning little handbook is exactly what you need to make the most of your iPhone.

Hacking and Securing iOS Applications

Hacking and Securing iOS Applications
Author: Jonathan Zdziarski
Publisher: "O'Reilly Media, Inc."
Total Pages: 357
Release: 2012-01-17
Genre: Computers
ISBN: 1449325238

If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary. Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your apps Learn how attackers infect apps with malware through code injection Discover how attackers defeat iOS keychain and data-protection encryption Use a debugger and custom code injection to manipulate the runtime Objective-C environment Prevent attackers from hijacking SSL sessions and stealing traffic Securely delete files and design your apps to prevent forensic data leakage Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace

Life Hacks for Kids

Life Hacks for Kids
Author: Sunny Keller
Publisher: Houghton Mifflin Harcourt
Total Pages: 211
Release: 2017
Genre: Biography & Autobiography
ISBN: 132874213X

Presents unique craft projects that have been seen on the Life hacks for kids YouTube show, including feather earrings, melted crayon art, a headband holder, and indoor s'mores, and includes questions answered by Sunny.

iOS Hacker's Handbook

iOS Hacker's Handbook
Author: Charlie Miller
Publisher: John Wiley & Sons
Total Pages: 409
Release: 2012-04-30
Genre: Computers
ISBN: 1118240758

Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it. Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work Explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks Also examines kernel debugging and exploitation Companion website includes source code and tools to facilitate your efforts iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks.

iPhone Unofficial Cheats, Hacks, Hints, Tips, And Tricks Guide

iPhone Unofficial Cheats, Hacks, Hints, Tips, And Tricks Guide
Author: Trevor Clinger
Publisher: Trevor Clinger
Total Pages: 29
Release: 2024-06-26
Genre: Computers
ISBN:

Discover the secrets to mastering your iPhone in "iPhone Unofficial Cheats, Hacks, Hints, Tips, And Tricks Guide." Packed with insider cheats, hacks, hints, tips, and tricks, this comprehensive guidebook will transform your iPhone experience. From boosting productivity to capturing stunning photos, optimizing battery life to personalizing your device, become an iPhone expert and unleash the full potential of your device with this guide. Whether you're a beginner or advanced user, this book is your ultimate companion for mastering your iPhone.

Google Apps Hacks

Google Apps Hacks
Author: Philipp Lenssen
Publisher: "O'Reilly Media, Inc."
Total Pages: 379
Release: 2008
Genre: Computers
ISBN: 059651588X

Google is challenging the venerable Microsoft Office suite with its own Web-based office applications. This book offers scores of clever hacks and workarounds that enable power users to get more out of various applications.

Big Book of Apple Hacks

Big Book of Apple Hacks
Author: Chris Seibold
Publisher: "O'Reilly Media, Inc."
Total Pages: 640
Release: 2008
Genre: Computers
ISBN: 0596529821

The Big Book of Apple Hacks offers a grab bag of tips, tricks and hacks to get the most out of Mac OS X Leopard, as well as the new line of iPods, iPhone, and Apple TV. With 125 entirely new hacks presented in step-by-step fashion, this practical book is for serious Apple computer and gadget users who really want to take control of these systems. Many of the hacks take you under the hood and show you how to tweak system preferences, alter or add keyboard shortcuts, mount drives and devices, and generally do things with your operating system and gadgets that Apple doesn't expect you to do. - Publisher.