Language Selection

English French German Italian Portuguese Spanish

nokia 770 sdk

Filed under
Linux

yes, this has been covered heavily. not nearly enough noise has been made about how easy hacking this device is. nokia has opened up almost everything even placing the graphics under a creative commons license. nokia has also constructed a firm foundation to develop on. underneath everything is a debian based system with a 2.6.11 kernel. debian is one of the largest binary distributions mainly because of its apt package management system. apt will make it really easy to get new software and keep the installed software updated. a modern kernel means the device will be able to keep up with developing technologies like bluetooth and usb. the next layer is an xserver.

the best news for you is that nokia has set up a comprehensive development site. it describes the underlying software layers and how to set up the development environment to emulate the device. it even has a walkthrough for how to port applications to the device. as an example they show how to port gaim, which is funny because most places have reported that im support won’t be released until 2006.

Full Story.

More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News