![]() ![]() GPRS ( General Packet Radio Service) is the slowest of these protocols, providing speeds up to 40Kbps’ similar to a dial-up modem. GSM describes the technology for providing voice services, but the GSM system includes several levels of wireless data service as well. ![]() There are a number of different cellular phone standards, but the technology in widest use around the world and standard in Europe is called GSM (Global System for Mobile communications). Now imagine a world where everyone is holding a broadband-connected, Unix-based personal computer in their hand.Ĭan you think of anything that Apple just might not have thought of?Īpple’s iPhone was originally released in the United States exclusively on the AT&T network. ![]() Late-’90s computers were fast enough to use broadband and to fuel the first Internet boom.īut this computer fits in a shirt pocket, and can be controlled with one finger. It’s important to realize that the iPhone is as powerful as a top-of-the-line late-’90s computer. And thus, the hacking community will continue to push the boundaries of what can be done with the phone. It might just be the future killer application. No matter what Apple adds to its Software Development Kit (SDK), there will always be something important that they left out. The impulse to get the iPod-already the de facto standard MP3 player-to do even more is irresistible. But this iPod surfs the Web, gets email, and maps your location, and new applications are constantly being developed for it. The iPod touch is the heir apparent of the iPod, and once flash memory sizes surpass hard drives, the iPod touch will be the iPod. Unlocking the phone so that it can use SIM cards anywhere is a major industry, and will probably continue to be so even after Apple’s exclusive contracts with mobile carriers are gone. The iPhone is a global device that uses the international standard GSM protocol. There’s this myth that hacking will go away “once Apple adds that one killer feature.” But it’s unlikely, because the iPhone is unlike the earlier iPods or any phone on the market before it. There are a lot of reasons to hack your iPhone or iPod touch. Chapter 1. IPHONE AND IPOD TOUCH HACKING BASICS ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |