Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

another jail break topic


  • Please log in to reply
2 replies to this topic

#1 com.put.er?

com.put.er?

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:03:57 AM

Posted 08 June 2012 - 09:27 AM

So, im totally new and no almost nothing about software/hacking/programming. I am electronics tech by trade. Now that thats out of the way, I have a question and hopefully im in the right forum.

I have a device that I want jailbroke. Not going to mention said device at this time but I want a program to hack it. Its a fairly common device that a specific audience uses. Much like a ipod/iphone, it can only be installed (married) to one "computer" at a time. It is a software flashing device and I want to be able to use it on multiple systems without having to uninstall. Is this possible? What kinda of cost would I be looking at for development if it is possible? Remember, I know nothing and would need a programmer to do all the development. Heres the big one, is it legal to market? I would assume yes seeing that there is tons of stuff to hack you apple devices.

BC AdBot (Login to Remove)

 


#2 groovicus

groovicus

  • Security Colleague
  • 9,963 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Centerville, SD
  • Local time:02:57 AM

Posted 08 June 2012 - 11:56 AM

We don't typically talk about techniques for bypassing security measures in any way. That said, if you have a popular enough device, then some casual research will yield exactly what you are looking for.

#3 com.put.er?

com.put.er?
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:03:57 AM

Posted 08 June 2012 - 12:27 PM

We don't typically talk about techniques for bypassing security measures in any way. That said, if you have a popular enough device, then some casual research will yield exactly what you are looking for.


I understand this probably isnt the place for these questions. However, my search did lead me here. Really I am just looking for someone familiar to tell me what it would take and who I should seek out. The device is mass produced but the target audience is specific. Not a huge market but its there.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users