The iPhone has a sim slot right on the top. You push a tiny button and
it pops out.
Mason
b_s-wilk wrote:
The discrepancy may be for people who bought the iPhone and use it
with PAYGO. That wouldn't register as a regular ATT account, since you
don't have to give personal information to sign u
Yes, all AT$T phones do.
Mike
On 7/28/07, b_s-wilk <[EMAIL PROTECTED]> wrote:
>
> Does it have a SIM?
>
> Betty
>
>
>
* ==> QUICK LIST-COMMAND REFERENCE - Put the following commands in <==
* ==> the body of an email & se
The discrepancy may be for people who bought the iPhone and use it with
PAYGO. That wouldn't register as a regular ATT account, since you don't
have to give personal information to sign up.
The phone "can't" be opened to switch SIM cards, but it wouldn't
surprise me if it's been done successfu
At 12:02 PM 7/26/2007, Tom Piwowar wrote:
>Interesting to note that Apple shares dropped 7% on Tuesday on a bogus
>news story that iPhone sales were not up to expectations. On Wed shares
>were up 10% on news that the story was bogus and news that Apple profits
>were up 78%.
>
>So you are right,
Another member of the team noted that if they stopped using everything that
had an exploit they'd not be able to use any computers of any kind. Not
quite the cold dead remark, but true.
Mike
On 7/26/07, Tom Piwowar <[EMAIL PROTECTED]> wrote:
> Proving? Not until it has been demonstrated. All
There were discrepancies between numbers ATT posted of Iphone sales
and numbers Apple posted of I phone sales.
When it all boiled down it seems Apple may have included # shipped by
end of quarter and ATT counted actual number sold by end of quarter
and the difference was in inventory still in
> Proving? Not until it has been demonstrated. All they have done is
> claim. There are enough Apple-haters out there that I reserve
> judgement on any such claims until demonstrated. The whole Brian
> Krebs/David Maynor/WiFi fiasco did that to me.
Actually the person discovering this vulnerabilit
Well that's ok, because with this vulnerability hackers can see how they
are.
Mike
On 7/24/07, John DeCarlo <[EMAIL PROTECTED]> wrote:
I don't believe that Safari and the iPhone are inextricably linked.
--
John DeCarlo, My Views Are My Own
*
On 7/24/07, mike <[EMAIL PROTECTED]> wrote:
Most windows breaches are due to third party software or the browser...so
strictly speaking it isn't the pc being compromised.
Not sure what you are trying to say.
If you want to say that an Oracle vulnerability isn't a Windows
vulnerability, you a
>Most windows breaches are due to third party software or the browser...so
>strictly speaking it isn't the pc being compromised.
The day after Monday is Tuesday.
* ==> QUICK LIST-COMMAND REFERENCE - Put the following comman
Can't resist the headline of this reg article.
http://www.theregister.co.uk/2007/07/24/iphone_security_vulnerability/
Mike
On 7/24/07, mike <[EMAIL PROTECTED]> wrote:
Most windows breaches are due to third party software or the browser...so
strictly speaking it isn't the pc being compromised.
Most windows breaches are due to third party software or the browser...so
strictly speaking it isn't the pc being compromised.
Mike
On 7/24/07, Tom Piwowar <[EMAIL PROTECTED]> wrote:
>"A security firm has run the first remote exploits on Apple's iPhone,
>proving that the widely popular smart p
>"A security firm has run the first remote exploits on Apple's iPhone,
>proving that the widely popular smart phone is vulnerable not only to
>data theft but also to being turned into a remote snooping device."
The vulnerability is a new variant of a known issue with the Safari
browser. So, str
Actually they did prove it.
http://www.securityevaluators.com/iphone/
at the end of the video they show the dump they get from the iphone among
other things.
Mike
On 7/24/07, Roger D. Parish <[EMAIL PROTECTED]> wrote:
At 11:36 AM -0400 7/24/07, Chris Dunford wrote:
>"A security firm has run
At 11:36 AM -0400 7/24/07, Chris Dunford wrote:
"A security firm has run the first remote exploits on Apple's iPhone, proving
Proving? Not until it has been demonstrated. All they have done is
claim. There are enough Apple-haters out there that I reserve
judgement on any such claims until de
Apple knows, and the exploit wasn't released to the wild. I see a fix
coming soon in it's future.
Mike
On 7/24/07, Chris Dunford <[EMAIL PROTECTED]> wrote:
"A security firm has run the first remote exploits on Apple's iPhone,
proving that the
widely popular smart phone is vulnerable not only
"A security firm has run the first remote exploits on Apple's iPhone, proving
that the
widely popular smart phone is vulnerable not only to data theft but also to
being turned
into a remote snooping device."
http://www.eweek.com/article2/0,1895,2161696,00.asp?kc=EWKNLNAV072407FEA1
17 matches
Mail list logo