If you were thinking about picking up one of Motorola's newest Android handset, maybe this will push you over the edge. Android tinkerer Dan Rosenberg has published a root exploit that should work on almost all of Motorola's recent devices including the RAZR M, Atrix HD, Photon Q, RAZR i, and the upcoming RAZR HD.
The exploit is exceptionally easy to run. All you have to do is get your device plugged in with USB debugging on.
We've talked quite a bit about Fuhu's Nabi 2 tablet, which was designed specifically for children. Given its $200 price tag and powerful Tegra 3 processor, 1GB RAM, and Android 4.0, this device is not only great for the kids, but it packs a punch for parents, as well. (To get a better idea of everything the Nabi has to offer, check out my full review.)
The one downside of the Nabi 2, however, is its lack of Google Apps.
Sure, the Galaxy S III is the first major flagship device to get Jelly Bean outside the Nexus line. That's not fast enough for you, though, is it? Of course not! We can do better! Or, more accurately, XDA can do better. In fact, a TouchWiz Jelly Bean ROM has found its way to the development forum giant's threads already!
The build is still unofficial and obviously there are inherent risks to flashing it.
If you jumped on the phablet bandwagon as soon as the Intuition hit Big Red's shelves, you've probably been waiting for a root exploit to hit so you can take full control of the system. Good news! Thanks to our boy jcase, you can now have what your heart so desperately desires. Let's get started.
Those of us with rooted devices and a penchant for flashing ROMs know just how valuable a great backup tool can be. Titanium backup is undoubtedly one of the most popular (and most useful) backup tools around, and it just got an update to version 5.6.0.
The update, which had been floating around as a "test version" prior to official release, brings a few UI enhancements and fixes, an updated set of translations, and improved "Market Doctor" and "Force Attach" functions to repair broken links between apps and the Play Store.
Yesterday, we told you that Amazon's newest Kindles are shipping with locked bootloaders. We mentioned that this probably wouldn't prevent the devices from being rooted, as a method was already in the works. That method has now been confirmed, and root for the Kindle Fire HD is go!
This is confirmed to work on the Fire HD 7, but should work on all new variants that are based on ICS.
So, you were thinking about picking up a Kindle Fire HD, rooting it, and throwing a ROM on it for an impressive $200 tablet? Turns out that idea may not work out as well as we initially thought: both the Kindle Fire HD and the second gen KF have locked bootloaders. Bummer.
This may not mean that custom ROMs are impossible on these devices, only that it's more improbable.
For those who may not know, the bootloader is responsible for checking the firmware's signature before a device boots.
Today, Motorola just floored users with an unprecedented offer: if you bought a phone from Motorola that launched in 2011, most of you will receive an upgrade to Jelly Bean. If, however, you're using a phone that Motorola decides will have a degraded experience, you will receive $100 in credit towards an upgrade. This may mark the first time that a manufacturer has broadly promised compensation for a lack of updates for all of its devices.
Look around the web and it seems like whenever anyone has a "how can I make my <Android device> do ______," the answer is invariably "root it." And to anyone involved in the Android community, you get the impression that most Android users are rooted. Unfortunately, what people tend to forget is that while a few million Android users may be rooted, there are hundreds of millions of active Android devices out there - meaning rooted users represent a small minority of owners.
For months now, users who wanted to root their Logitech Revue GoogleTV unit were either forced to use hardware modifications or do without. Now, though, Android hacker extraordinaire Dan Rosenberghas found a way to do it completely through software. There's only one problem: it's both extremely difficult and risky. Still, if you're up for a challenge, this one's for you.
This hack uses an exploit called nandpwn, which is explained better on GTVhacker than I could ever do:
A local privilege escalation exploit for the Logitech Revue that leverages the ability to map the hardware registers of the NAND flash controller in conjunction with a Linux kernel information leak to clobber kernel memory in a way that allows gaining privileges.