How to Jailbreak Your iPhone – Easy Way Tech Guide

If you’re an iPhone user, you probably understand the concept of Jailbreaking. It basically means opening up your iPhone to use all sorts of software, not just the limited free and paid software provided by Apple but it opens up the door to using other sources of software.  It doesn’t take a monumental effort to Jailbreak your iPhone. It’s fairly easy to do, and it can really boost your iPhone experience by giving you access to a whole new dimension of apps. Just follow this guide to Jailbreak your phone and you’ll gain access to countless new apps within no time.

I did my first Jailbreak thanks to this guide at - they cover jailbreaking and Rooting (for Android) as part of their monitoring software guides. It is an interesting site covering all types of spy software for iPhones and Android devices - just another reason why Jailbreaking could be needed! Now back to the guide ...

First, Create a Backup!


Safety first!If you want to do an iPhone Jailbreak on an iOS device filled with important data, then your first step is to create a backup of all files. This is just in case something goes wrong. You can use all sorts of online software to backup. If you’re a hardcore iOS user, then your first choice should be iTunes, naturally. Because iTunes also has a backup feature. Anyway, finding a software to be able to back up your data will not be difficult. But if you have a lot of data in your iPhone, then the actual process of backup might take a few minutes. Be patient!


After finishing the process, you should remove password protection from your iPhone. And you should also stop any and all programs on your iPhone and on your PC too. This has to be done before you start the actual Jailbreak process.

Next, Find the Correct iPhone Jailbreak Version

You need to find the correct version of the Jailbreak software for your phone. Different versions are available and you have to find the one that matches your iPhone Operating System (iOS)

To find out what version of the iPhone Operating System your phone has, go to Settings on your Home screen, after that go to General, and then About. Scroll to the bottom and you will see the details of your Operating System.

After you’ve found out what version of iOS your phone uses, get the correct version of Jailbreak software. There are lots of download sources for these software, one example being If your iOS version isn't listed there, look for other sources; you’ll find plenty of sources like this one online. Your goal is to find such an online download for a trustworthy Jailbreak software that lists your iOS version and then download the Jailbreak software files.

Once the software is downloaded to your PC, follow the instructions given during installation by your Jailbreak software. Some downloads may be in zip file format so if you don’t have it already you should get your hands on an unzipping software. is a good for example. If you don’t want to spend another half an hour researching archive software then just download it now.

If your Jailbreak software files are in a zipped file, then run the 7-zip software or any other archive software with unzipping features. And then you can extract the original files from the zip file that you downloaded. Once you’ve done all of this, go to the Jailbreak software directory and look for the installation file. The installation file usually ends with an .exe or rather its filename extension is .exe. Found it? Great! Let’s install it then!

Using the Jailbreak Software

As mentioned before, make sure you’re not using your iPhone or PC for anything else before running the software; iTunes should be closed down as well.

Open the Jailbreak program by running the installation file (.exe) and connect your iPhone and PC with a USB cable.  After that just hit the “Jailbreak” button and let it complete the installation. The process is not quite simple, so don’t be alarmed if it takes a while. Find something to drink and think about your day while the installation completes.

Once the process is finished, you will be prompted to open the Jailbreak icon that appears on your iPhone’s home screen. After you open it, the Jailbreak will be finished. Now, only one small step remains.

Now that you have an iPhone with a Jailbreak you should know that Cydia App is the main source of all the new apps that is now available for your iPhone. So make sure you get the app. After this app is downloaded and updated, you’ll have a fully functioning Jailbroken iPhone.

The process of Jailbreaking is fairly simple, if you follow the right guide, however not all iPhones are the same. Sometimes there will be something preventing you from Jailbreaking your iPhone. For example getting your device out of Safe modecan become tricky sometimes.

There are countless tiny reasons that can stand in your way, so make sure that before you panic and give up, you look up frequently asked questions online. Trust me, Jailbreaking isn’t something a handful of people know about. Whatever problems you have with your iPhone Jailbreak, many others have experienced it as well and some of them probably found solutions for it and posted it online.


How Dangerous Is Automatically Logging Into Your PC

While it is extremely convenient, enabling the automatic login feature on your Windows PC can be potentially problematic. When you utilize this setting, the password for your Windows account is stored in a location where it can be accessed by anyone (or any software) with administrator access.

Additionally, if your Windows PC password is identical/related to the passwords that you use for your email, financial accounts, etc., then the automatic login feature could be extremely detrimental to your security.

Never Use A Registry Hack

Allowing automatic logins by the use of a registry hack is by far one of the worst ways to activate this feature. This registry hack involves altering values in KEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ in your Windows registry.

This gives you the ability to activate AutoAdminLogin and set values for; DefaultDomain, DefaultPassword, and DefaultUsername. Do you see the obvious problem here? By using this registry hack you are placing all of your login information in a location where any software that has registry access can view it.

The Other Methods Out There Are Only Slightly Better

Another automatic login method is the utilization of ‘hidden user account tools’. One of the most popular tools with this functionality is Netplwiz (this isn’t visible in your Control panel’s list of tools). SysInternals is another popular tool that serves the same function as Netplwiz. These tools require that you give it your password and your username so that they can automatically sign you in whenever your computer starts up.

While these tools won’t store your password directly in the registry, they will store it as an LSA Secret. This gives your information an additional level of security, since software that want to access this information would have to have the ability to read the data. While this may sound somewhat secure, all it takes to crack is a mediocre decryption program that has administrator access. NirSoft has a program called LSASecretsView, which wascreated just for this purpose. This program gives the user the ability to see everyLSA secret on the installed device – this includes your saved auto login information.

Is Your Password Extremely Valuable To You?

So should all of this matter to you? That’s a question that only you can answer. Just how important is the password that you use for your PC? If your login password is something simple (like your first name) and you don’t care who logs into your PC then you’re probably alright.

One of the main issues is that quite a lot of people actually use important passwords to log into their Windows accounts. Even though reusing passwords is not recommended, a large majority of users use the same password for their email account, Windows account, and other important accounts. Placing such an important password as an automatic login (where it is then saved openly on your computer) is incredibly dangerous.

In addition to this, newer version of Windows (Windows 8, 8.1, and 10) automatically utilize Microsoft accounts as their default means of authentication. So, if you use your Microsoft account to login, and then activate automatic logins, the password for your PC and Microsoft account are now saved where users and software can easily gain access to it. This means that they can potentially have access to your OneDrive files, email account, and any other services that you Microsoft account is liked to.

You Can Log In Without Typing In A Long Password

The newer versions of Windows – Windows 8, 8.1, and 10 – all have simple methods of logging in that are not only safer than automatic logins, they are not as tedious as entering a long password.

One such method is the utilization of a simple PIN. This is a numerical passcode that is short and likely easy to remember, yet still safe and secure. Other login features that are available are: using a picture password, using your PC’s webcam to login, or a fingerprint sensor.

While these can all be hacked with a great amount of effort, they are vastly better compared to any automatic login feature. If for some reason you can’t live without an automatic login feature, then at least set your PC’s password to something simple, like “password”, that you won’t use for other online accounts. You should also forgo using a Microsoft account, instead utilize a local user account.


Using Multiple Antivirus Software To Scan Your Computer

It is often recommended that individuals who own a computer should utilize one antivirus program at any given time. However, the problem with this approach is that there isn’t a single antivirus software that is faultless or completely infallible. While a specific antivirus software may say that your computer is completely clean and secure, another antivirus may find malware hiding amongst your files. Fortunately, we don’t have to strictly abide to the “one antivirus” approach.

When choosing to utilize more than one antivirus program, what you should actually be doing is: use your most comprehensive antivirus as your first line of defense and keep a second antivirus program as your ‘ace in the hole’. The first antivirus should be running constantly, providing background protection while you use your computer, the second antivirus should be activated intermittently (e.g. every weekend), to scan for things that the first antivirus may have missed.

If you happen to be wary of a certain file, you can quickly scan it with both antivirus programs or utilize websites that scan files with multiple antivirus software.

So Why Shouldn’t I Have Multiple Antivirus Programs Active Concurrently

The answer to this is quite simple; virtually all antivirus programs are made to function as the only security service on a computer. Nowadays, any antivirus worth its salt comes with a background scanning feature that gives your computer constant virus protection at all times. This means that whenever you run a program, download files, or visit any website, the antivirus takes note of everything and watches or potential threats.

An antivirus program often forms a symbiotic bond with your computer’s operating system so that it can perform its functions much more efficiently and effectively. However, this is where the problem lies. If you try to utilize two different antivirus programs at once, your problems may range from negative system performance to complete operating system crashes.

So How Can I Use Multiple Antivirus Programs To Scan My Computer?

As stated before, no single antivirus program can completely defend against every possible security threat. Windows Defender (Microsoft Security Essentials) is a good choice for a continuous antivirus software.

The other antivirus program that you utilize once or twice a week will be your secondary source of protection. Since this antivirus software will be activated manually (and you also don’t want it clashing with you other antivirus), it is imperative that you disable all real-time security services. Not only will this prevent clashes and make things run smoother, it will also speed up you system and antivirus scans as well.

Your secondary antivirus software should fit a few criteria.


  • It should be versatile
  • It should have the option to disable real-time security services
  • It should be discreet

Some popular antivirus programs that fit these criteria are:

ESET Online Scanner: ESET comes from the development team who created NOD32. It is flexible and has the ability to easily isolate and remove detected malware.

Malwarebytes:The free version of Malwarebytes fits the role of secondary antivirus perfectly. There is no automatic scan function, so you have complete control over what, when, and where this antivirus scans.

Instead of being lightweight and fast, your secondary antivirus software should favor accuracy and precision. If you’re going to be running this program once a week, then a quick scan should be the least of your priorities. An example of a program that makes for a bad secondary scanner is Bitdefender QuickScan. While this antivirus is speedy and extremely lightweight, it fails when it comes to locating complex malware.

So How Can I Use Multiple Antivirus Software To Scan A Single File


Sooner or later there will come a time when you have a suspicious file or two downloaded on your computer. Maybe the website that you found it on guarantees that it is safe, or maybe you had it emailed to you by a sender who claims that your antivirus is acting up by saying that the file has a virus. Whatever the case may be, you’ll want a definite answer.

When a situation like this arises you can make use of VirusTotal. This Google-owned website gives you the ability to upload a file (up to 32MB) and have it scanned by 46 antivirus programs. Of course there is still a slight margin for error when scanning with VirusTotal. However, the large number of antivirus programs utilized make this margin for error virtually negligible.

Got an iPhone you need to Jailbreak? - I have a new guide about that, check it out.