Most college kids are at home this time of the year, celebrating the end of finals and/or nursing hangovers. But the ROM's scene's number one destination is hosting classes all year round at the the new XDA University site. XDA-Developers has been working on the extension of the main site as a destination for newcomers to the world of root, custom ROMs, and other Android modifications, as well as a place to learn about more serious Android development.
Just like subscribers to any other phone service provider, advanced users of the hybrid 3G/WiFi mobile virtual network Republic Wireless are eager to customize and modify their phones - probably more so, in fact. That's why we posted a rooting guide for the only Republic phone available, the Motorola Defy XT. But in a message to the Republic subscriber base, an employee clarified the company's position on rooting, custom ROMs and other modifications to the Android hardware it provides to its customers.
There's some disturbing news today on the Android security front: an vulnerability has been discovered for Samsung's Exynos 4-powered devices. While the related exploit is useful for the mod scene in that it can be harnessed to gain superuser permissions and root pretty much any device running on an Exynos 4 chip, it's also got some rather disturbing implications. According to an XDA member with the handle "alephzain", who developed the exploit, using this security hole can also grant an app access to all physical memory on a given device - basically, anything stored in RAM is fair game.
When the Droid DNA was first announced, we were all surprised to find that the bootloader was unlockable at HTCdev.com. Because of this, the device actually got root, recovery, and custom kernel days before the official release. Unfortunately, by the time the device became available in retail channels, Verizon pulled the plug and it was no longer unlocked through official means.
Thankfully, there's another way (isn't there always?). The softmod below will effectively change the carrier information, allowing it to once again be unlocked via HTC's official tool.
A few days ago, developer mskip released the Nexus 4 toolkit, which simplifies the unlock/root/recovery/etc. process on the device. The same dev has now released the Nexus 10 toolkit, which does essentially the same thing, only for Google's first 10" slate. These toolkits really take the work out of doing a number of otherwise potentially tedious tasks:
FUNCTIONS OF GOOGLE NEXUS 10 TOOLKIT V1.0.0 [20TH NOVEMBER 2012] * Install correct adb/fastboot drivers automatically on Windows xp/vista/7/8 32bit+64bit * Backup/Restore a single package or all apps, user data and Internal Storage * Backup your /data/media (virtual SD Card) to your PC for a Full Safe backup of data * Unlock/Re-Lock your Bootloader * Root Stock Jelly Bean builds (upto 4.2.0 JOP40C) * 1-Click For All to Unlock the Bootloader, Root, Rename the Restore File and Flash Custom Recovery * Perform a FULL NANDROID Backup of your system (Boot, Cache, Data, Recovery and System) via adb and save in Custom Recovery format on your PC which can be Restored via CWM Recovery * Pull /data and /system folders, compress to a .tar file and save to your PC * Dump selected Phone Partitions, compress to a .zip file with md5 and save to your PC * Install BusyBox on your phone * Extras, Tips and Tricks section available to all ToolKit Donators * Auto Update ToolKit to latest pushed version at startup (donator feature) * Program up to 10 Quickpic slots and run them very quickly (donator feature) * Mods section to automatically perform certain tasks on your phone * Download Google Stock Image directly to correct ToolKit folder for extracting and flashing (no need to move it manually anymore) * Flash Custom Recovery or Google Stock Image to phone * Rename the Recovery Restore File present on some Stock Roms * Boot into CWM Touch Recovery without Flashing it * Boot or Flash .img Files directly from your PC * Install a single apk or multiple apk's to your phone * Push Files from your PC to your phone * Pull Files from your phone to your PC * Dump selected LogCat buffers to your PC * Dump BugReport to your PC * Set Files Permissions on your phone * Open new Command Prompt for manual input * Reboot Phone to Fastboot Mode or Android from fastboot mode * Reboot Phone to Fastboot Mode, Recovery, Android or Download Mode from adb mode
The ToolKit.exe and ModsSection.exe files may be detected as malicious by some anti-virus software.
Way back in February, a man by the name of Ben Randall demoed an amazing voice control app called "utter!" that he had started developing. The initial video (a whopping 22 minutes long) demonstrated some amazing capabilities - take a look for yourself:
But that was over 9 months ago, and aside from the initial release of the (very limited) alpha, we haven't heard much about the app, though Mr. Randall has kept interested parties updated via his very active XDA thread.
It's pretty disheartening to get an awesome new phone only to realize the bootloader's locked down tight. That's means no custom recovery, no ROMs, no custom kernels, no... anything fun. Until, of course, some dedicated developers get ahold of the device in question and bend it to their will. That's exactly what Project FreeGee has done for both the Sprint and AT&T variants of the LG Optimus G.
The tool essentially unlocks the bootloader of both devices, allowing a custom recovery - and eventually, custom ROMs - to be flashed.
Maybe you already have your Nexus 4. Maybe you have to wait three more weeks to get it. Or maybe you didn't get one before they sold out. Regardless of your particular situation, if a Nexus 4 is in your future (or present), there's a pretty good chance you're going to want to root and ROM it. And, honestly, not everyone is comfortable doing this kind of thing manually. Good news: the Nexus 4 toolkit is here!
We already know that Nexus devices are easy to unlock and root, but the process is still a bit different each time. Thus, XDA member HQRaja posted a handy guide on exactly how to root the Nexus 4.
There are two different ways of rooting the device - using either ADB with an insecure boot image, or directly through ClockworkMod Recovery. While both methods are posted in the source thread at XDA, the CWM method is undoubtedly easier and will probably feel more familiar to most.