Fudzilla is reporting that Intel will release Arrandale-based processors on January 3rd, 2010. Three in fact, branded as “Core i5″ and “Core i7,” ranging in speed from 2.4GHz to 2.66GHz.
There are two Core i5 models. One features 3MB of cache, a 2.4GHz frequency, two cores and four threads plus Turbo Mode, while the other features two cores, four threads, Turbo Mode, 3MB of L2 cache and a 2.53GHz frequency. Fudzilla prices them at $225US and $257, respectively.
Finally, the 2.66GHz Core i7 model features 4MB of cache and Turbo Mode and can run faster. Fudzilla expects them to sell for $332. You’ll remember that desktop Macs received Nehalem architecture processors earlier this year, which these Arrandale processors are based on. If built into Apple’s MacBook Pros, they’d represent a significant performance boost over the Core 2 Duo processors currently in use.
It seems like the hackers are at it again, and have rooted the Verizon Motorola Droid. For those who dont know this means soon you should be able to add custom features such as themes, Multitouch browsing, tethering, blue tooth files transfers ect! The possibilities are endless. We all know Verizon likes to lock down their phones, and the Motorola Droid is no exception. Any day now new hacks should start rolling out. Keep checking back for the newest hacks for the Motorola Droid, as they are released.
Heres the info from “Zinx Verituse” over at AllDroid.
I’ve rooted the Droid;
md5sum of initial exploit zip: 94a0c30ea9104c2776d042e760bfd716
The exploit provides a /system/bin/su from AOSP (that is, you can only use it from adb shell).
Other payloads can be arranged, but I’m too lazy to make them myself.
Provide a decent payload and I will turn it in to an update.zip that the Droid will apply.
Restrictions: The payload zip must be <63k
I can add files already in the official update to it (update-binary).
New exploit zip, including Superuser from CyanogenMod
1) get signed -voles-ESD56-from-ESD20.84263456.zip (md5sum 3af35446905040a3123ec09195299596)
2) get droid-superuser.zip (this file, md5sum e517995a7d1fe233c61df17c7f7c2a63)
3) append this file to the end of signed-voles-ESD56-from-ESD20.84263456.zip
* Windows: copy /b signed-voles-ESD56-from-ESD20.84263456.zip+droid-superuser.zip update.zip
* Linux: cat signed-voles-ESD56-from-ESD20.84263456.zip droid-superuser.zip > update.zip
The md5sum of update.zip will be cf653352967253e99d967498ffd9ce69
4) Copy the update.zip to the sdcard on the phone
5) Boot the phone to recovery mode (hold X and power the phone on)
* You’ll get a triangle + exclamation point if done right
6) Apply the update by pressing Volume Up + Camera
There will probably be mirrors for the pre-concatenated version of droid-superuser.zip, so check this thread.
Eclair has a new signature checking mechanism, which has a hole allowing unsigned updates up to a certain size.
bootable/recovery/verifier.c notes that a zip file could be hidden in the signature, and has measures to prevent this, but due to a copy/paste mishap, does not check for a hidden zip properly.
This was brought to my attention by embeem, a week or two ago. I do not know who mentioned the problem to him.
Patch that closes the hole:
After nearly five years of loyal service, Mininova disabled access to over a million torrent files when it partly shut down its website. Starting today, only approved publishers are able to upload files to the site, but luckily there are plenty of alternatives and potential replacements BitTorrent users can flock to.
Mininova, founded in January 2005, grew out to become one of the most successful torrent sites with millions of daily users.
The site has grown steadily over the years and continues to do so, despite a setback in court this summer. In fact, today the 10 billionth torrent file was downloaded from Mininova, an impressive achievement to say the least.
At present there is no method native to 10.6 Snow Leopard to format a drive with a Linux filesystem such as EXT2 or EXT3. This hint uses a bootable open-source Linux CD-ROM running the gparted application in order to format and partition these and many other filesystems.
To create a bootable CD that you can use to manipulate Linux-formatted drive volumes, take the following steps.
Download the latest version of gparted-live — make sure to get the ISO disk image.
To boot into the CD, select it in the Startup Disk System Preferences pane and then restart. Warning! Use a USB keyboard and mouse, as this Linux OS cannot handle Bluetooth wireless.
Be somewhat amazed as your Mac reboots and Unix code streams down the page. There are a couple of prompts for input along the way, before you arrive in the GUI of the OS.
The gparted (Gnome Partition Editor) software launches automatically, and you can select any mounted volume for information and manipulation, and many filesystems are supported. There is extensive online documentation and support for this software.
Be very careful! Formatting deletes all your data, so obviously the usual precautions about backing up apply. Be sure to select the correct volume on which to make any changes!
Shut down when you have finished. Warning! Your Mac may not respond to the alt (option) key when you restart and you may have to manually eject the CD before you can reboot into OS X.