Posts by ppdon

    The iPhone Dev Team have released two quick updates to RedSn0w since we last reported on the multipurpose jailbreak tool. According to the Dev Team’s blog, version 0.9.11b3 was released to fix random “restore failed” messages and version 0.9.11b4 fully supports tethered jailbreak of A4 devices (1st gen iPad, iPhone 4, 4th gen iPod Touch) which adds SHSH “stitching” support for iOS 5.1.1 as well as “custom” NO_BB IPSWs for unlockers.......



    Download RedSn0w 0.9.11b4 Mac OS X/Windows: Stitching & Custom Creation NO_BB IPSW | iJailbreak.com

    With the iPhone Dev Team updating their popular Redsn0w jailbreak tool to include a method of downgrading A5-powered devices, it provides a perfect opportunity for those who may be sitting on the latest firmware with an iPad 2 or iPhone 4S to roll back to 5.0.1 once again in order to benefit from an untethered jailbreak. With pod2g closing in on his untether for Apple’s latest firmware and testing against the latest devices going all well, the need to roll back and jailbreak iOS 5.0.1 could be temporary, but the fact remains that a lot of users will benefit from this........



    Jailbreak iPhone 4S, iPad 2 The Easy Way Using Redsn0w | Redmond Pie

    The iPhone Dev Team has released the updated version of their Redsn0w tool which was teased a while back on Twitter by MuscleNerd. The update as you’d expect is a very significant one, and brings with it the support for downgrading the iPhone 4S, iPad 2 and the new 3rd-gen iPad to an earlier version of iOS 5 from iOS 5.1.1.


    Downgrade 5.1.1 To 5.0.1, 5.1 On iPhone 4S, iPad 2, iPad 3 Using Redsn0w [Video Tutorial] | Redmond Pie


    Looks like Apple have patched their activation servers and the unlock no longer works but if you saved your activation ticket you can still unlock with the saved ticket.


    How To Use Saved SAM Activation Ticket To Unlock Your iPhone | Redmond Pie

    [reader]
    label = tring
    protocol = smartreader
    device = 002:003
    pincode = 1234
    caid = 0BAA
    detect = cd
    mhz = 600
    cardmhz = 600
    ident = 0BAA:000000
    group = 1
    emmcache = 1,3,2



    [reader]
    label = sct
    protocol = smartreader
    device = 002:002
    caid = 0500
    detect = cd
    mhz = 500
    cardmhz = 500
    ident = 0500:042700
    group = 2
    emmcache = 1,3,2
    audisabled = 1



    No changes that i can see...

    I was pm'd this morning informing me that my cards were offline, i rebooted server and thought everything was back to normal, i looked at my oscam status and noticed: rejected user ident (121 ms) (0 of 0) (no card support 0500:032830).
    My cards are 0500:042700(SCT) & 0BAA:000000(Tring)..


    Anyone know why i have suddenly started getting these requests as i havent noticed these before.??

    Yesterday we told you that MuscleNerd pointed out a Chinese hacker Loktar_Sun managed to manipulate SAM (Subscriber Artificial Module) to unlock any model of the iPhone on any baseband. This is some very big news because we have not seen a new software unlocking solution that adds support for all basebands and all models of the iPhone for a very long time. For those of you who are interested in unlocking your iPhone 3GS, iPhone 4 or iPhone 4S (CDMA + GSM) on any firmware above iOS 5.0 and also any baseband version you will be glad to know in this how to guide you will learn how to do just this.


    How To Easily Unlock iPhone With SAM 0.1.16-1 On Any Baseband [CYDIA] | iJailbreak.com Updated easier version!!!




    Just tested on my iphone 4s locked to 02, working with a 3 sim...


    Did u know that Bethere have been suffering with packet loss issues over the last few weeks?? probably not the cause of your problems but just a heads up, i'm going to BTinfinity soon.


    ISP Be admits crippling iPlayer demand burst its pipes ? The Register


    N: 127.0.0.1 15001 username pass 01 02 03 04 05 06 07 08 09 10 11 12 13 14 256
    F: line1 test1 2:0:0 { 0:0:2 }


    try that..

    Sorry m8 im deffo missing something here i reckon.. all thats in my cfg is


    N: 127.0.0.1 15001 username pass 01 02 03 04 05 06 07 08 09 10 11 12 13 14 25
    and an fline
    so
    SERIAL READER : /dev/ttyUSB0 smartreader+ is not there


    thanks


    Try it with those exact settings i gave u, if it works then amend what u need to..

    Oscam.conf should look like this,


    ####oscam.conf####


    [global]
    nice = -1
    logfile = /dev/null
    clienttimeout = 5000
    fallbacktimeout = 2500
    clientmaxidle = 120
    cachedelay = 120
    bindwait = 120
    resolvedelay = 30
    serialreadertimeout = 1500
    maxlogsize = 10
    waitforcards = 1
    preferlocalcards = 1
    saveinithistory = 1
    keepalive = 1


    [webif]
    httpport = 8888
    httpuser =
    httppwd =
    httprefresh = 5
    httphideidleclients = 0
    httpallowed = 192.168.0.0 - 255.255.255.255
    debug = 255


    [newcamd]
    key = 0102030405060708091011121314
    port = 15001@0500:42400


    Oscam.user should look like this,


    [account]
    user = username
    pwd = pass
    group = 1
    monlevel = 0
    uniq = 0
    au = JSC
    caid = 0500
    ident = 0500:042400


    Oscam.server should look like this,


    [reader]
    label = JSC
    Protocol = smartreader
    detect = CD
    device = 002:002
    Group = 1
    EMMCache = 1,3,2
    CAID = 0500
    mhz = 500
    cardmhz = 500
    ident = 0500:042400




    Put this line in cccam.cfg


    N: 127.0.0.1 15001 username pass 01 02 03 04 05 06 07 08 09 10 11 12 13 14 256


    I think that is correct:snicker:

    Goto files then oscam.server and add these to the cfg,


    [reader]
    label = ***UK
    Protocol = smartreader
    detect = CD
    device = 002:002
    Group = 1
    EMMCache = 1,3,2
    BoxID = xxxxxxxx
    CAID = 0963
    ident = 0963:000000


    That is for your smargo if using *** card.

    Use oscam webinfo, type ip of server port 8888( example 192.168.0.111:8888 ) in your browser goto readers tab at top then with your smargo plugged in click on scan usb and it will tell you what usb port its connected to.


    SERIAL READER : /dev/ttyUSB0 smartreader+


    That worked on my debian 6 but the card( SCT V4 ) kept disconnecting so i switched to oscam and now very stable....


    I used this tutorial..


    http://linuxsat-support.com/li…l-package-debian-6-a.html


    In your oscam server file smargo device would look like this,


    Protocol = smartreader
    device = 002:003


    They are mine for example u would have to find your correct usb port( smargo ) device number, i'm using 2 smargos in my debian 6.