Slatedroid info

Everything about android tablet pc [slatedroid]

How to Root the LG G4 and Install TWRP Recovery – XDA TV

Posted by wicked July - 30 - 2015 - Thursday Comments Off


A rooting method has finally been found for the flagship LG G4. In this episode, XDA TV Producer TK shows you how to root and install TWRP recovery the LG G4. TK just recently reviewed the device.  So as is usual at XDA, we must root all the things, and the LG G4 is no exception!

TK presents instructions on how to gain root access on your LG G4 using tools from the XDA Developers Forums. The process is painless and pretty easy. This video shows you how to install TWRP recovery as well. So if you want to root your LG G4, take a moment and check this video out.

Be sure to check out other great XDA TV Videos

Resource Links:

LG G4 Variants Rooted! OnePlus 2 Invites Open! – XDA TV

Posted by wicked July - 27 - 2015 - Monday Comments Off

Root access gained for T-Mobile Xperia Z3, Verizon Xperia Z3v

Posted by wicked May - 6 - 2015 - Wednesday Comments Off

We’ve talked about Sony’s locked bootloaders recently, and we feel the consumers who can totally relate with that are Sony Xperia device users in the United States. It doesn’t matter what carrier you get it from, it will most likely have a locked bootloader, because life just sucks like that. We kid, of course – it’s just more difficult for US Xperia users, that is a fact. But there just might be good news at the jump.

Against all odds, XDA member “zxz0O0” was able to gain root access for the T-Mobile Sony Xperia Z3 (D6616) and the Verizon Sony Xperia Z3v (D6708). The hack leverages on a new exploit, specifically CVE-2014-7953. If you use any of these models and are itching to gain root access, this might be the time for you.


A couple of caveats – installation will include running a BAT executable file from your PC, so if you’re not comfortable with that, then this might not be for you. Specifically for the Verizon Xperia Z3v, users will have to make sure that they are on the original shipping firmware – build number 23.0.E.0.376 – in order for the exploit to work.


Last few warnings, exploiting your device to gain root is a major hack – you will need to take responsibility for it when something goes wrong. And yes, at some point in time, something is bound to go wrong. We suggest having a full working backup of your phone just in case something bad happens. Check out the instructions in the official XDA forums – for D6616 and D6708.

VIA: Xperia Blog

Thursday Poll: Rooted or Non-Rooted?

Posted by Kellex November - 20 - 2014 - Thursday Comments Off

Throughout the day, thanks to topics like the Nexus 6 having encryption that can’t be turned off without taking matters into your own hands, we have seen the emergence of a healthy discussion around the topic of tinkering. When we say “tinkering,” we are talking about understanding adb commands, flashing recoveries or images or ROMs, and generally deciding that you can make your phone better than it is out of the box. As the conversation has grown, a number of readers have taken it back to what we used to consider to be the initial step in becoming a tinkerer, and that’s through rooting a phone. And that thought has revived this poll question, which we try to run at least once a year, but haven’t seen December of 2013. In other words, it’s time.

So, let’s do this. In the poll below, all you have to do is answer by choosing if you are “rooted” or “non-rooted.” From there, to continue this conversation, feel free to jump into the comments section and talk about the phone you own, if you are rooted or non-rooted, why you fall into either of those categories, etc.

Note: There is a poll embedded within this post, please visit the site to participate in this post’s poll.

Thursday Poll: Rooted or Non-Rooted? is a post from: Droid Life

Remove Band Restrictions from Qualcomm devices with these steps

Posted by wicked September - 11 - 2014 - Thursday Comments Off

One of the more annoying things that smartphone hardware manufacturers do from time to time is to restrict devices from using certain wireless bands even though technically the hardware supports those bands. This is particularly common from companies like QUALCOMM where they restrict hardware from working on wireless frequencies abroad.

What that means for the user is that if you travel your phone may not work in certain countries even though the hardware is capable. A process for removing these software imposed restrictions on various Qualcomm devices has been published with the goal of letting your device connect to any wireless frequencies it is capable of.

There are some caveats to the process that anyone considering trying it out needs to know. One major caveat for those who like to keep devices stock is that you do need a rooted device. The other drawback is that the process of removing the limitations is a long one.

The entire process has 36 steps and as with anything that requires a rooted device and modification of system files, there is always the chance you will make a mistake that may render your smartphone useless. Those brave enough to try it out can get the required files here, and be sure to let us know how the process goes.

SOURCE: XDA Developers

Rooted Android devices being denied access to Barclays bank apps

Posted by wicked September - 2 - 2014 - Tuesday Comments Off

Barclays is a major bank in the UK and the bank has made a decision that has angered many fans of Android devices. Barclays is blocking any rooted Android smartphone from running its two banking applications on the device if the device is rooted. A petition has been put up that activists want Barclays customers to sign in protest of the move.

The anger from Barclays customers is that the bank has two apps that are commonly used with one called Pingit, a mobile funds transfer service. Pingit and the Barclays Mobile Banking app can’t be run at the same time for users of rooted devices.

There are a number of reasons that people root their Android devices, many of them are legitimate. It appears that Barclays thinks rooting your device is tied to nefarious activities and makes the device less secure. Many Android fans know that rooting your device can actually make it more secure if you use the right apps.

As of now, Barclays is still blocking access to both apps on a rooted phone. Barclays have made no official comments at this time and it remains unclear what exactly the bank fears in letting rooted users run both apps.

SOURCE: Gomonews

Chromecast Is Root

Posted by wicked August - 25 - 2014 - Monday Comments Off

Image from [psouza4] on the xda-developers forum

Chromecast is as close as you’re going to get to a perfect device – plug it in the back of your TV, and instantly you have Netflix, Hulu, Pandora, and a web browser on the largest display in your house. It’s a much simpler device than a Raspi running XBMC, and we’ve already seen a few Chromecast hacks that stream videos from a phone and rickroll everyone around you.

Now the Chromecast has been rooted, allowing anyone to change the DNS settings (Netflix and Hulu users that want to watch content not available in their country rejoice), and loading custom apps for the Chromecast.

The process of rooting the Chromecast should be fairly simple for the regular readers of Hackaday. It requires a Teensy 2 or 2++ dev board, a USB OTG cable, and a USB flash drive. Plug the Teensy into the Chromecast and wait a minute. Remove the Teensy, plug in the USB flash drive, and wait several more minutes. Success is you, and your Chromecast is now rooted.

Member of Team-Eureka [riptidewave93] has put up a demo video of rooting a new in box Chromecast in just a few minutes. You can check that out below.

Filed under: Android Hacks, home entertainment hacks

Blackphone Gets Root Access in MORE Than Five Minutes

Posted by egzthunder1 August - 13 - 2014 - Wednesday Comments Off

root blackphone jcase

Security is a rather paramount issue in this day and age where sensitive technology is handed to people who probably should not have it until they are old enough to drive. People are as widely, overtly inappropriate on the Internet as they humanly can be, yet they have the audacity to reach out for web outlets whenever their “stuff” leaks out into the Internet. Then, these same people are the ones who complain that hackers and the government are after them because of all the important (eye of the beholder) text messages that are stored in their devices are gone. After all, nothing screams “national security threat” like a message from your mom asking if you want meatloaf for dinner. That is one side of the coin, while the other side involves people who truly need to have some sanctuary from the horrors of the likes of hackers, root, or even the government. They can, and probably are, holding onto important information on their e-mail accounts and whatnot that could jeopardize something worth going after. So, how do the latter deal with such a sword of Damocles dangling on top of their heads? The answer is to get a phone that is secure enough to hold all their stuff. Enter the Blackphone.

The Blackphone is a device made by a joint venture between Silent Circle and Geeksphone, which is now known as SGP Technologies. The device is an Android phone unlike many others out there. The main difference between this and your [enter your device name here] lies mainly in the software make up of the phone. Yes, it still runs on Android, but with a modified version of the OS (read: custom ROM) known as PrivatOS. This ROM has been loaded with several “secure” applications that should make you feel more secure while going about your daily routine. Also, the phone’s security has been boasted by the company to be parallel to none as the PrivatOS is more mature than most OEM options currently out there and therefore, most (if not all) vulnerabilities are nothing but a thing of the past. So much was their confidence that the company decided to take their product into one of the largest hacker expos, Def Con. Now, as you are aware, there are various types of hackers, all with very different motivations to do what they do, but one thing that they do have in common: They sure do love a challenge when presented with one, and XDA Senior Recognized Developer and Forum Moderator jcase is no exception.

According to jcase, the device was rooted but it was not an easy task as reported by many, many, many other blogs (several of these pro Blackberry blogs taking this opportunity to take a few stabs at their new competitor, which is a fight that equates Android users and iOS users to a certain extent). Most of them reported that the entire ordeal lasted a whopping 5 minutes, which is factually incorrect (and in fact, many have either withdrawn the articles or amended them with the proper information). Jcase goes on to state that there were 3 different vulnerabilities found in the device at the time, and that root was achieved without the need to unlock the device’s bootloader.

The first vulnerability found was a way to re-enable ADB on the device, which is disabled by default. The company went a few steps further than simply disabling ADB and decided to do away with Developer Menu altogether. The company came back stating that this was not done as a security measure but rather as a temporary fix due to USB ADB connectivity creating stability and performance issues on the device (when ADB was on and encryption was turned on, the device was said to go into a bootloop). Due to a pressing and rather tight schedule, instead of trying to quickly work out a patch to see where the issue was, they simply swept it under the rug until they could find what was causing the problem with hopes to push an OTA update to re-enable the missing dev options and ADB with it. In any case, this vulnerability (regardless of whether the company admits it or not) was required to get the root method to work.

The second part of the root process involved a lot of tinkering with the actual device. First and foremost, you needed to get USB ADB going on it (hence, the previously mentioned vulnerability). Next, you pretty much need to flat out ignore any and all recommendations by the manufacturer during set up. Next up, device encryption needed to remain off and you needed to grant permission to “unknown sources” for installing apks. And last but not least, you needed to either disable or at the very least know the PIN to the device in question. There was a third part in the whole exploit process but jcase has decided not to disclose this part to the general public and instead reported it to the company.

The entire affair was not exactly short lived, despite what other blogs may state and jcase walked out of this one with nothing but bragging rights and a custom made t-shirt, effectively letting the company know what he thought about the “reward” for his efforts. This, however, was really nothing but a joke as jcase holds no ill will against the company and in fact, has gone on to say that he appreciates the professionalism displayed by their CSO and CEO regarding the entire ordeal. Yes, the device was rooted but it is far from being the insecure junk that Blackberry users make it seem. This device is an alternative to those who own BB devices and cannot justify giving up the security perks of the device for a brand new and shinny Android phone. Yes, the device may have obtained root access but that does not make it any less secure. So, to all the people out there who brag about BB’s security, lets just say that you may be picking attention from the very people your “security” is meant to drive away. Just remember, in the words of JFK

We choose to go to the moon in this decade and do the other things, not because they are easy, but because they are hard, because that goal will serve to organize and measure the best of our energies and skills, because that challenge is one that we are willing to accept, one we are unwilling to postpone, and one which we intend to win, and the others, too. – John F. Kennedy

Just replace “go to the moon” with “hacking BB10″. You can find more information in the original (and actually accurate) article from Ars Technica.

The post Blackphone Gets Root Access in MORE Than Five Minutes appeared first on xda-developers.

Android L developer preview now rooted on Nexus 5 and 7

Posted by wicked June - 28 - 2014 - Saturday Comments Off

Well that was fast. The Android “L” test firmware – a developer preview for the Android version that was revealed at the Google I/O keynote and the one that we will all probably get the full version by later this year – was released for the Nexus 5 and Nexus 7 devices yesterday. And today, root access is delivered by the good folks at XDA (hooray!).

Brought to you by XDA Recognized Developer “savoca” just a few hours after its release, root access will now be available for your Android L Developer Preview. The Google keynote gave us a good view of what the “L” version would look like, and it’s mostly good. Our review will give you an idea of what it looks like, but it will not be that big of a departure from Android 4.4. The keynote hints at subtle changes and new features, not far removed from what Android 4.4 Kitkat users are used to today.

The procedure to gain root is fairly straightforward, but there are a few prerequisites. Your Nexus 5 or 7 needs to have a custom recovery installed. Then you flash, flash Chainfire’s SuperSU. The pick your device’s bootloader and fastboot from the list and flash the appropriate boot.img for your device. Easy, right?

Chainfire does warn that root access in the “L” version doesn’t work quite like as it did in the past. There will be apps that can write to /system and there will be others that cannot. Chainfire attributes this to previous root app breakage and the need for new security contexts. But other than this, root access will be available to you for Android L preview, which should be pretty useful moving forward. Grab the links from this XDA post.


Nokia X rooted, now has flashed ROM and proper Google apps

Posted by wicked March - 1 - 2014 - Saturday Comments Off

What’s the saying? Oh yeah: You can lead a Developer to a smartphone, but you can’t make them use the weird OS you put on it. That goes for any device, and the newest “Android” handset, the Nokia X, has already been rooted and flashed with a custom ROM.

Who’s got these things already, you ask? Developers, of course. The Developer-only (for now) Nokia X devices have already been shipped, and giving Developers a device means they’re going to tinker. Using Framaroot, one Developer has easily made the Nokia X their own. Sounds ho-hum, save for one thing: Google Services.

The Nokia X does not ship with Google services, meaning buyers lose out on all sorts of things that make Android great like Maps or Search. The current method of providing apps to the Nokia X is for Developers to submit their Android apps to the Nokia store, which Nokia says can usually be done without any rewriting of code. Third party apps are great, but some just can’t stack up to Google’s offerings.

While the Nokia X doesn’t pack much in the way of specs, we find a different reason to raise an eyebrow here. First, we love a good root story. More importantly, if KitKat is really meant to be optimized for lower-end devices, what better example than the Nokia X? We’re hoping a root/KitKat duo will show us just how low KitKat can really go. At 512MB memory and 4GB Memory with a 1GHz Snapdragon, the bar is set really low.

Source: XDA Developers
Via: Ubergizmo

ePad 7 Android 4.0 ICS
$162 $100 FREE SHIPPING 

10" Android 4.2 1.2GHz Tablet PC