Linux operating systems
Linux is not an operating system, but just its kernel. Everything that you are accustomed to see and understand as an OS (buttons, windows and panels) - in fact, it…

Continue reading →

Internet marketing
Internet marketing is an organization of marketing in the Internet environment. Internet marketing methods include: design and development of Internet sites, contextual advertising banner advertising search engine marketing e-mail marketing,…

Continue reading →

How hackers turn our printers, cameras and thermostats into sinister cyber army
In the fall, several large hacker attacks took place in which IoT devices were used. One of them is for Russian banks. The Daily Poster tells the story of other…

Continue reading →

Apple iPhone OS

Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and attractive toys for leisure and business. Our new friends not only know how to polyphony, show pictures and surf the Internet, but also become fashion accessories that cannot be put on a table in a cafe next to a cup of tea, from time to time sliding the index finger on the inscription “Slide to unlock”. But the day is heading towards the evening, your electronic partner is tired and he has to go on a charge. Well, insert the USB tail where necessary … let it rest.

Guest article written by Maxim Mozaev specifically for Nevor.ru. Maxim is well versed in all kinds of glands and actively uses Apple products. I don’t use the products of the fruit company myself, so I had to invite a competent person who is in the topic to write this article.

Mobile OS Overview
So that your mobile assistant can perform its tasks, one iron and battery are not enough. The necessary software filling, which will provide the necessary device functionality, that is, the operating system (OS) and applications (apps). So what mobile OS are there and how do they differ from each other? Today on mobile devices you can find such systems:

iPhone OS (iOS from version 4.0) from Apple
Google android
Symbian from Nokia
Blackberry RIM
Windows Mobile (Windows Phone from version 7)
other …
Of course, each one has its own chips, which it is proud of, and the jambs that it tries to pass off as chips, in this article we will consider iOS from Apple.

iPhone OS (iOS from version 4.0) from Apple
iOS4

Surely there are very few people left in the world who have not heard about iPods, iPhone phones and other wonderful products of the apple company, and more inquiring minds have probably heard about iOS, the Apple operating system under which its products such as iPod touch, iPhone and iPad work. .

Interface
At the time of the first iPhone, the interface was innovative enough for a smartphone. Large icons that are easy and convenient to press with your finger. Large keyboard, also finger-friendly. Several virtual desktops with icons for organizing applications (apps). Nothing extra. Only pages with icons, no menus or dialog boxes.

iOS4 interface

To some, this state of affairs may have seemed somewhat ascetic, so iOS 4.0+ provides for the installation of a background image for the “desktop”, as well as the ability to organize icons in folders. Everything for the user, as you can see

iOS4 desktop

By the way, such an interesting phenomenon as dock, the virtual shelf where the most popular applications are placed, was also first widely used in Apple products. As you can see, it is also available in the iOS interface and can store up to 4 icons.

The iOS interface is standardized and has not changed from version to version. Customize it to your liking, you are also unlikely to succeed. You can make little difference unless you make a Jailbreak, which will be discussed below.

IOS architecture
iOS is designed in such a way that, firstly, to make the system stable, and secondly, to reduce electricity consumption and extend the life of the battery. Even if this means that you have to give up part of the functionality and prettiness.

Each application in iOS runs in a “sandbox” (sandbox), which eliminates the possibility of one application affecting another, both at the file system level and at the RAM level. In practice, this means, on the one hand, the stability of systems and the fact that iOS does not freeze, also if the App1 application does not finish correctly (it just closes by itself or is weird), this will not affect the operation of the App2 and App3 applications.

Isolation of applications greatly enhances iOS security, because applications can only access files in their sandbox, so your notes cannot be secretly or accidentally sent to, say, a blog through the Livejournal App.

However, it is not without inconvenience. For example, if you downloaded a video from the network through a special rocking chair, you won’t be able to view it if there is no video player functionality in the rocking chair. And there is no way to transfer files from one application to another.

Another interesting feature is the sharing of resources. A running application in iOS is given all available resources, and all other applications are closed. That’s why a phenomenon like brakes is extremely rare on Apple devices. Moreover, in a state where all applications are closed, you can be sure that there is no service left in the background that will eat the entire battery or pump out the entire limit of mobile traffic while you are having lunch or sleeping.

Although stability and energy saving is very important, in some cases, the unambiguity negates all the advantages of this approach.

Causes and methods for resolving error 0x0000007b
If a problem 0x0000007b occurs, a blue screen appears on the monitor. The PC stops responding to any action. In some cases, a reboot may help. Such a problem often…

...

Apple iPhone OS
Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and…

...

IT consulting
IT consulting refers to the widest range of solutions designed to optimize existing IT resources for the needs of a particular business, its structure and features. Ultimately, its goal is…

...

How to hack a computer
A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in…

...