Friday, June 15, 2007
Episode 56 URLs & Notes (MP3) (AAC)
- SANS Security Training: Security 508: Forensics
- Ventrilo
- Email from Scott Lewis
- Exploring: reCAPTCHA: A new way to fight spam
- Google Street Maps
- iPhone To Allow 3rd-Party Development
- movabletype.org
- Substitute teacher spared sentencing for porn pop-ups, gets new trial
- Other People’s Porn
- The Slurpr WiFi aggregator promises “free” broadband — and jail time
- StarCraft II
Received via e-mail from Aethon:
Hi,
I was listening to Geek Muse 56 and you mentioned the term “second part developer”. Collectively you guys expressed a little confusion about whether it even was a real term. Well it sort of is. It is used in the video game industry to designate a company that develops with exclusivity to a specific console by either partial ownership or contract. This is regarded as being different from say a “division” of the first party company. A common example of such a second party (at least historically) is Rare Ltd. They used to be a second party developer for Nintendo making games such as Battletoads, Goldeneye, and even Donkey Kong Country. In 2002 the founders sold their 51% to Microsoft ending their second party status for Nintendo.
I’ve never heard it outside of the video game industry, but thought this bit of information would interest you.
Keep up the good work with the podcast.
Thanks for the clarification, Aethon! I have a friend who works for E.A. – I’ll shoot him an e-mail and ask about this.
Any bets on how quickly the iPhone will be hacked like the Apple TV?
[QUOTE]Any bets on how quickly the iPhone will be hacked like the Apple TV?[/QUOTE]
Friday 29th June approx 7pm ;)
I’m sure that there will be reports of hacking the iPhone before the weekend is over. I’m also sure that at some point, someone will get Linux running on it.
Well, not quite a hack, but the ‘root’ and ‘mobile’ user passwords (in /etc/passwd) have been cracked. There’s no way to ‘ssh’ or use a Terminal on the iPhone (yet!), but just keep ‘alpine’ (and maybe ‘dottie’) written on a Post-It note in a drawer for future reference.
If there is a remote (Bluetooth?) way of hacking the iPhone, then this is not good news.
And we have full shell access on the iPhone:
http://hackint0sh.org/forum/showthread.php?t=1408