March 21, 2013 By: Conan Troutman
XDA Elite Recognised Developer AdamOutler is at it again. Following up on his Verizon Note II root method, he continues to roll out safe and easy-to-deploy root exploits via CASUAL, the Cross-platform ADB Scripting, Universal Android Loader.This time, the device in question is the AT&T Samsung Galaxy S III.
One of the major benefits of CASUAL is that it is cross platform. Adam has been spending a great deal of time in bringing support for many different platforms to a consistent level. If you have him circled on Google+, you may have already noticed him tackling the OS X upgrade process in an effort to test these exploits for Mac users. That’s where you come in. Adam is especially keen to hear from users of both OS X and various different Linux distros about how CASUAL functions for them. It even works on the Raspberry Pi, so if you want to test it out on one of those and report back, I’m sure it would be much appreciated.
This latest mod will root an AT&T Galaxy SIII incredibly easily, as CASUAL handles the download and installation of drivers and runtimes. The end result is a fully rooted device courtesy of Elite Recognised Developer Chainfire’s CF-Auto Root. This will work even for those who are already rooted, so if you’d simply like to help test for compatibility you can do so without unrooting beforehand.
So if you have an AT&T SIII, rooted or not, what are you waiting for? Head on over to the development thread and lend a hand in making this the ultimate cross platform utility.
March 15, 2013 By: Jimmy McGee
A new bill was released in congress addressing the SIM unlocking ban. That story and more are covered by Jordan, as he reviews all the important stories from this week. Included in this week’s news is OPPO Find 5 source code release. Jordan talks about the rooting options for the Sony Xperia Z.
Jordan talks about the other videos released this week on XDA Developer TV. XDA Developer TV Producer Steve gives a Windows Phone App Review of Freda, XDA Developer TV Producer and newcomer Steve released a video on the Basics of Tasker, and XDA Developer TV Producer TK released an Android app review showdown with Sidebar taking on Glovebox. Pull up a chair and check out this video.
December 4, 2012 By: Jimmy McGee
In this episode of XDA Developer TV, we show you how to root your Samsung Galaxy S III. The popularity of the Samsung Galaxy S III and its variants have produced a few rooting methods. There are many features you can gain by rooting your device. We present three step-by-step instructions on how to gain root access on your Samsung Galaxy S III using tools from the XDA Developers Forums.
The first process posted by XDA Recognized Contributor mrRobinson works for the AT&T, T-Mobile and Sprint US variants. This method typically does not trip the flash counter, but can take some time. The second method is by XDA Elite Recognized Developer Chainfire. This works for the three aforementioned US variants and the International version. This method is quick, but it does trip the flash counter. Finally, we cover the use of XDA Senior Moderator and Recognized Developer mskip’s toolkit. You can find versions for the four previously mentioned variants of the toolkit. This is a semi-automatic method and does trip the flash counter. So take a moment and check this video out.
November 23, 2012 By: Jimmy McGee
In this third part of our four-part series, XDA Elite Recognized Developer and TV Producer AdamOutler shows you how to root your Samsung Galaxy Camera with Odin, Elite Recognized Developer ChainFire’s CF-AutoRoot, and a PC. Before this episode, AdamOutler submitted a recovery to Chainfire to be CF-AutoRooted. AdamOutler shows how easy CF-AutoRoot is to use.
In this episode, AdamOutler gives you a list of reasons why you would want to root your Galaxy Camera. He then gives you the step-by-step process for rooting the Galaxy Camera. If you missed it, check out part one of this series, where AdamOutler unboxes the Galaxy Camera and shows of the basics. Also, be sure to check out part two for a detailed tear down of the internals of the device.
November 20, 2012 By: Jimmy McGee
Recently, Jamie Condliffe of Gizmodo posted an article asking why anyone would want to root their stock Android device. Our recent news that we published regarding the Nexus 4 being rooted prompted the question.
Condliffe asks, “What are the amazingly useful features you can only access by rooting a Nexus 4? And are they worth the effort, when you already have a great, clean install of Android on your handset in the first place? Tell us”
Who better to answer this question than our own wireless device freedom advocate and XDA Developer TV Producer azrienoch. In this video azrienoch “tells them” why rooting is worth the effort. Check out what azrienoch has to say.
Thanks to its international reach, XDA TV gets to try and experiment with some very interesting, and sometimes unheard of phones and devices. The dual-core version of the Meizu MX is really only available in China and parts of Europe. Though there is talk of their next quad-core phone coming stateside. Regardless of the Meizu MX’s stateside popularity, there has been some significant development. Some of that development has been covered by XDA Portal Administrator Will Verduzco in this article.
In today’s episode of XDA TV, Will teaches us how to root the Meizu MX and install Ice Cream Sandwich on the device. Will begins by installing Ice Cream Sandwich on the Meizu MX. He then takes us through the process of getting the Meizu MX rooted using tools from the XDA Developers Forums.
Just yesterday, we gave the HTC One X a home in our forums. While some of us are desperately waiting for the April 5th release date, we are glad to see that a Superboot root tool has been released by XDA Forum Member paulobrien.
Running the root tool is as simple as executing a batch file on Windows or a script on Linux and Mac. In the words of the developer:
Superboot is a boot.img that when booted, will root your device the first time you boot (installing su and the superuser APK). No need to flash any partitions, no need to mess around with ADB, no messing with the contents of your data partition, no overwriting the shipped ROM on your device, just boot the boot image using the instructions below and you’re done!
Superboot image is also ‘insecure’, allowing you to use ‘adb remount’ as well as having full ADB root access to your device until such time as you reboot after running this process (it’s a non permanent ADB root as it’s a ‘fastboot boot’ and not a ‘fastboot flash’).
February 16, 2012 By: Joseph Hindy
Rooting a device can be some sticky business. In some cases, it’s as easy as using one of the well known one click solutions, such as SuperOneClickRoot. Others, however, require some cunning such as manually patching files and using ADB.
Once root is established though, it’s work from the community that makes that root seem less imposing and easier to obtain for the less technically challenged. It is in that spirit that XDA Member Condi has taken a prior root method for the Sony Tablet S and turned it into a simple to use Windows script. The modifications made over the prior version of the root method include:
to eliminate problems like ‘com.pwn.me’ error etc.
timing is correct,
it goes fully automatic,
disabling mpt device automatically, and reenabling,
modded to work on 64 and 32bit systems,
(tested on winxp 32bit, win7 64bit).
The script is compatible with 32-bit and 64-bit Windows and has been tested on Windows XP and Windows 7. Simply make sure the proper MTP driver is installed, download the script, run it and you’ll be seeing that Superuser prompt in no time flat. It doesn’t get too much more simple than that.
So for anyone who was waiting for an easier way to root their Sony Tablet S, you can find the download link and additional information in the original thread.
February 14, 2012 By: Conan Troutman
Although it was released barely a week ago, the Motorola Droid 4 already has root. No doubt owners of this shiny new device are eager to start tinkering with it. Luckily for them XDA member mattlgroff has already put together a utility to allow Droid 4 owners to do just that.
It’s based around the exploit discovered by Dan Rosenberg, and as well as root it contains several other functions that you would expect to find in a handy all in one utility.
As of writing this, no fastboot files are currently available but the developer does state that the utility will be updated to a full version, including fastboot restore, as and when they become available. So if you are lucky enough to have a brand spanking new Droid 4 to play around with then head on over to the original release thread.
If you’ve ever attempted to root a device prone to difficulties or requiring a trial-and-error type exploit (the Motorola Droid X or T-Mobile MyTouch 3G Slide, for example) then you know how easily it can go wrong. Sometimes the operation fails and you end up with the superuser app installed but without actual root file system access. A quick search for ”lost root” on our forums yields an astonishing 274,000 results. Almost all the visible results link to posts where forum members believe they have lost root access, usually due to updating a ROM or accepting an over-the-air update.
XDA Member android_owl has created an app to help out in these all-too-common situations. SU Checker searches for and identifies Superuser binaries on your device in a flash. It can help check for root if you suspect you may have lost permissions. This great little diagnostic tool and time saver can be found in the release thread or on the Android Market here. Give it a try the next time and let the developer know what you think!