Why everyone hated Apple and why they were wrong
Apple's latest technical solutions have made a lot of noise. In the iPhone 7, the jack slot disappeared, in the new MacBook the usual connectors are replaced with USB Type-C…

Continue reading →

D-Link DIR-300 Setup
The DIR-300 router has been discontinued today, and its more modern version, DIR-300NRU, can be seen on sale. The difference between them is small: slightly different interfaces (NRU cannot be…

Continue reading →

Computer and vision
This article will discuss the effects of computers on vision. Initially, the article was focused on CRT-monitors (tube), which could seriously impair vision with regular work on the computer. More…

Continue reading →

Apple iPhone OS

Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and attractive toys for leisure and business. Our new friends not only know how to polyphony, show pictures and surf the Internet, but also become fashion accessories that cannot be put on a table in a cafe next to a cup of tea, from time to time sliding the index finger on the inscription “Slide to unlock”. But the day is heading towards the evening, your electronic partner is tired and he has to go on a charge. Well, insert the USB tail where necessary … let it rest.

Guest article written by Maxim Mozaev specifically for Nevor.ru. Maxim is well versed in all kinds of glands and actively uses Apple products. I don’t use the products of the fruit company myself, so I had to invite a competent person who is in the topic to write this article.

Mobile OS Overview
So that your mobile assistant can perform its tasks, one iron and battery are not enough. The necessary software filling, which will provide the necessary device functionality, that is, the operating system (OS) and applications (apps). So what mobile OS are there and how do they differ from each other? Today on mobile devices you can find such systems:

iPhone OS (iOS from version 4.0) from Apple
Google android
Symbian from Nokia
Blackberry RIM
Windows Mobile (Windows Phone from version 7)
other …
Of course, each one has its own chips, which it is proud of, and the jambs that it tries to pass off as chips, in this article we will consider iOS from Apple.

iPhone OS (iOS from version 4.0) from Apple
iOS4

Surely there are very few people left in the world who have not heard about iPods, iPhone phones and other wonderful products of the apple company, and more inquiring minds have probably heard about iOS, the Apple operating system under which its products such as iPod touch, iPhone and iPad work. .

Interface
At the time of the first iPhone, the interface was innovative enough for a smartphone. Large icons that are easy and convenient to press with your finger. Large keyboard, also finger-friendly. Several virtual desktops with icons for organizing applications (apps). Nothing extra. Only pages with icons, no menus or dialog boxes.

iOS4 interface

To some, this state of affairs may have seemed somewhat ascetic, so iOS 4.0+ provides for the installation of a background image for the “desktop”, as well as the ability to organize icons in folders. Everything for the user, as you can see

iOS4 desktop

By the way, such an interesting phenomenon as dock, the virtual shelf where the most popular applications are placed, was also first widely used in Apple products. As you can see, it is also available in the iOS interface and can store up to 4 icons.

The iOS interface is standardized and has not changed from version to version. Customize it to your liking, you are also unlikely to succeed. You can make little difference unless you make a Jailbreak, which will be discussed below.

IOS architecture
iOS is designed in such a way that, firstly, to make the system stable, and secondly, to reduce electricity consumption and extend the life of the battery. Even if this means that you have to give up part of the functionality and prettiness.

Each application in iOS runs in a “sandbox” (sandbox), which eliminates the possibility of one application affecting another, both at the file system level and at the RAM level. In practice, this means, on the one hand, the stability of systems and the fact that iOS does not freeze, also if the App1 application does not finish correctly (it just closes by itself or is weird), this will not affect the operation of the App2 and App3 applications.

Isolation of applications greatly enhances iOS security, because applications can only access files in their sandbox, so your notes cannot be secretly or accidentally sent to, say, a blog through the Livejournal App.

However, it is not without inconvenience. For example, if you downloaded a video from the network through a special rocking chair, you won’t be able to view it if there is no video player functionality in the rocking chair. And there is no way to transfer files from one application to another.

Another interesting feature is the sharing of resources. A running application in iOS is given all available resources, and all other applications are closed. That’s why a phenomenon like brakes is extremely rare on Apple devices. Moreover, in a state where all applications are closed, you can be sure that there is no service left in the background that will eat the entire battery or pump out the entire limit of mobile traffic while you are having lunch or sleeping.

Although stability and energy saving is very important, in some cases, the unambiguity negates all the advantages of this approach.

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

...

Monitor
The monitor is no secret to anyone, it shows us a picture, it’s difficult to work without it. At the moment, on the market you can find LCD monitors. In…

...

How to hack a computer
A home computer is an excellent and at the same time the most vulnerable place to attack. Hacking someone else’s PC, you can not only view the information stored in…

...

Monitor
The monitor is no secret to anyone, it shows us a picture, it’s difficult to work without it. At the moment, on the market you can find LCD monitors. In…

...