1
How to Restore/Unbrick your iPod Touch or iPhone

Sometimes when you try to hack your iPod Touch or iPhone, some things don’t work they way they should. That is why you will sometimes have to restore your device in order to start from scratch. It is also needed if you have a warranty and your device is physically broken like headphones don’t work […]

Continue...
5
How to Use SSH

Difficulty – Medium | SSH is a mean of getting access to the internal files of your devices. You will be able to access these files from your computer, allowing you to edit strings, add your own themes to your device, add applications you’ve downloaded and much more. To do this, you will need to […]

Continue...
4
Installing .DEB files

Difficulty – Easy | .DEB files are the files Cydia uses to install the package you want. Sometimes  though, cracked Cydia apps appear and the only way to install them is by installing the .DEB file directly from Terminal, iFile or the Cydia autoinstall feature. First method: Directly from Terminal Install Terminal from Cydia or […]

Continue...
5
Tips and Tricks

Difficulty – Extremely Easy | There are many little things you can do with your iPod Touch or iPhone just by pressing the “Home” and “Power” buttons in a certain sequence. This can be useful do many things. This tutorial will show an array of tricks that will aid in debugging your device or simply […]

Continue...
6
How to use WinterBoard

Difficulty – Very easy | WinterBoard is an application, which can be found on Cydia, that allows you to apply different themes to your iPod or Iphone. It is a small and very simple application that lets you choose which themes are being applied. Simply downloading a theme from Cydia will not do anything to […]

Continue...
7
Easiest way to JailBreak

Difficulty – Very easy | DO NOT UPDATE TO FIRMWARE 3.1.3 or 4.0 beta! CAUTION: Owners of new generation devices (iPhone 3GS and iPod 3g), MAKE SURE your SHSH is saved on Saurik’s (Cydia) server or you will not be able to Downgrade from 3.1.3 if you accidentally do so. In order to have hacked […]

Continue...