Wellcome to Our Website

You are now being redirected to our new website "Android Download Blog" Thanks for your patience.

Launching
comeback
launchpad
Showing posts with label Hacks And Mods. Show all posts
Showing posts with label Hacks And Mods. Show all posts

Samsung Galaxy S4 already gets CyanogenMod 10.1 nightlies

For a time, it was unclear that CyanogenMod would even support the new Samsung Galaxy S4, but that's when Steve Kondik stepped in. Kondik founded CyanogenMod, and worked at Samsung for a while, leaving the company about one month ago. Kondik went back to CyanogenMod after leaving Samsung, and he has already finished the first nightly builds for some Galaxy S4 models.

Right now, the only variants of the S4 that is getting the nightlies of CyanogenMod 10.1 are the T-Mobile model (SGH-M919) and a Canadian variant (SGH-I337M), but Kondik says that as soon as the source code drops for other models, it should be pretty quick to put together nightlies for those as well. These first builds aren't perfect, but Kondik says it should be good enough to be your daily driver. And, the team is already getting to work on supporting hover gestures for the S4. 

The first nightlies have been posted, although they would be a bit tough to find if you didn't know where to look, because they aren't listed as "Samsung Galaxy S4" or even by the model number. The T-Mobile variant is listed as "jfltetmo" and the Canadian model as "jfltecan". 

source: +Steve Kondik 

Root on: Google Glass has successfully been hacked

Cydia founder Jay Freeman wasted no time digging into his Glass, hacked into it and jailbroke it. What happens now is anyone’s guess as Freeman has not been able to much with it yet due to his eye-glass prescription making using Glass painful for more than a few minutes at a time. “It took me two hours while I was having dinner with friends at the time,” according to Freeman. Having this access means that there is potential to eliminate Google’s ability to remotely deactivate a set.

Freeman used an established Android 4.0.4 exploit to gain control of the operating system in headset…eyeset. He does not know if the same technique will ultimately work on the retail version of Glass whenever it becomes available.

Another hacker by the name of Liam McLoughlin was also successful in getting root access to his set of Glass yesterday. There has not been any formal reaction from Google about this, but when Freeman contacted an employee at Google, he was a little surprised that Glass had debug enabled, believing it had been removed.

One thing is certain, a whole range of possibilities emerge when things open up. Google is generally pretty collaborative with developers that hack into their stuff – when Google sanctions such activities that is.

source: Jay Freeman (Twitter) via EngadgetForbes, and 9to5Google

Samsung Galaxy S4 root exploit already available

The same kernel cracker that brought us the ability to gain access to the bootloader of the Motorola Droid RAZR, RAZR MAXX, RAZR M and Atrix HD has done his work again and paved the way to gain root access to your brand new shiny Galaxy S4 if you want.

This root exploit will work for Snapdragon equipped Samsung Galaxy S4 devices which means devices sold in the US, the UK and a few other countries.

The process itself is pretty simple, but it is worth reminding folks that since there are no recovery or stock images available, your S4 might become a handy paperweight if you break it in the process. OTA updates to the device will also undo the root access. The warranty on the device will also likely turn to dust and blow away. 

You can get to the exploit package via the XDA source link below. Here are the instructions as outlined by the developer: 

  1. Extract the entire contents of the zip file.
  2. If you are using Windows, ensure you have installed the latest Samsung USB drivers available for your phone.
  3. Ensure USB Debugging mode is enabled on your device.
  4. Connect your device to your PC via USB.
  5. If you are using Windows, navigate to the extracted directory and execute "run.bat". If you are using Linux or OS X, navigate to the extracted directory in a terminal and execute "./run.sh".
  6. Approve the ADB connection from your PC on your device.

Read through the forum posts as well to pick up any hints along the way. 

sources: XDA Developers

All-in-one toolkit lets you unlock and root any HTC One in a few clicks

HTC One now has its own toolkit for unlocking the bootloader, rooting, recovery for ROM flashing and so on. The developer hasoon2000 came up with the software, adapted from his work on previous HTC handsets.

There is one kit for each HTC One versions, so if you are novice and interested in getting the most out of your handset by tinkering around, head over to the source link for the installation details. There are already stable custom ROMs for the device out there that right a few wrongs, so you might be willing to give this a go.

source: hasoon2000 (XDA-Devs)

XDA allows Facebook Home to run on most Android device without root

Facebook Home has been relegated to use only on certain devices in certain regions. It was quickly found that if you were in an unsupported region, you could simply sideload the app, and be fine, but the unsupported devices issue took a bit more work to overcome. It has taken developers at XDA a bit under a day to modify the APK, but now you can run Home on any device you'd like.

Best of all, this hack doesn't require that you have root access unless your device has Facebook baked-in. If not, all you have to do is download the modified APKs, remove Facebook and Facebook Messenger, then reinstall things in order. First, install the official Facebook app, then the modified Home APK and optionally Messenger. Enable Facebook Home in the Facebook app settings, reboot and you're ready to go. 

Word from the XDA forum is that the apps work on a ton of different devices, including the Nexus 7. 

source: XDA Developers

Samsung Galaxy S4 root appears, but just for the rare Exynos 5 Octa version

The enterprising folks over at the XDA-Devs forums seemingly have managed to root the Samsung Galaxy S4, as usual before it is even released, like it is becoming customary these days for red-hot flagship handsets.

The ROM is packaged with ROOT&Busybox into an image flashable via Odin. The catch is that this is only for the Exynos 5 Octa version of the handset, and we just wrote a piece on why these won't be widespread any time soon. Most of the Galaxy S4 units will be powered by Qualcomm's Snapdragon 600 chipset, and for this one root is yet to come. 

Some devs already hinted that they won't give such high priority on the S4 as they used to with Samsung's previous Galaxy line flagships, but if the sales pan out as usual, the handset could again become the most hacked and modded Android phone for the year.

source: XDA-Devs

Google posts Android 4.2 factory images for CDMA Galaxy Nexus

If you're a really big fan of modding your smartphone, then you're in luck, because Google has posted the Android 4.2 factory images for both variants of the CDMA Samsung Galaxy Nexus. This means that both Verizon and Sprint users can now easily flash back to stock if they happen to try a new mod and something goes wrong.

The factory image of Android 4.2.2 for the Verizon Galaxy Nexus has been posted, as has the factory image of Android 4.2.1 for the Sprint Galaxy Nexus. Yes, that's right, the Sprint Galaxy Nexus is now the odd man out as the only variant of the Samsung Galaxy Nexus that hasn't been updated to the very newest version of Android. 

Even better for modders, the driver binaries have also been made available, and those are always a sticking point for custom ROMs. Driver binaries make custom ROM work much easier. 

Samsung Galaxy S4 ringtones, complete system dump leaks out

The Samsung Galaxy S4 seems like a well-rounded device - it’s battery tests have turned out solid and it’s a great performer. After yesterday we saw the S4 wallpapers from the device leak out, today the full system dump has leaked along with the ringtones.

This system dump is based on test firmware I9500XXUAMCH, and brings demonstration videos, the S Voice APK, as well as the wallpapers and ringtones. Of course this will be of most use to developers and not so much to the common user.

System Dump Details:
Android Version: 4.2.2 – JDQ39
PDA: I9500XXUAMCH
Build Date: 23 March 2013
Changelist: 335382

Download full system dump (Size: 1549.8 MB)

Download Samsung Galaxy S4 Ringtones only (Size: 11.8 MB)

CyanogenMod crew split if they should bother developing custom ROMs for the Samsung Galaxy S 4

Now this is not a pretty development, pun intended. The group that delivered to you the famed CyanogenMod ROMs for the Samsung Galaxy line before, is apparently not planning to put as much effort into the Galaxy S 4. This is their reasoning:

Nobody at Team Hacksung (the team behind Galaxy S2, Note, S3, Note2, G Tabs… official CM ports) plans to buy it, neither develop for it. There are two variants which will be a pain to maintain, [and] the bugs we have on the S3 will probably be there on S4, too (camera), and we all know Samsung ability to release sources while staying in line with mainline. Yes Qualcomm releases sources, but Exynos sources we had were far from [working on] actual Galaxy products. I’m pretty sure the same will happen for this one.

That’s a uniform “no” from us.

The CyanogenMod crew, however, was quick to issue a rebuttal that says it's premature to judge whether or not the S 4 will be good for hacking and modding:

Setting Device Expectations

Let’s start with the simplest form of this: CyanogenMod does not pre-announce support or lack of support for devices. Ever. Even for the Nexus 4, we did not announce support until a nightly build was available. Further, any announcement regarding the ‘dropping’ of device support will be communicated via this Google+ page, Twitter, Facebook, our blog, or a combination of those; it will not be something buried in a forum post.

This morning, a comment from a CM collaborator on XDA was taken to be as an ‘absolute’ in regards to support of the S4. He offered the opinion of four TeamHacksung maintainers, their frustrations and lack of interest in supporting the S4. What’s seemingly lost on those reading this is that his comments as an individual do not speak for CyanogenMod as an organization.

As for the team’s stance on the S4, there isn’t one at this time, and most definitely won’t be one before the device is sold at retail.

- The CyanogenMod Team

Given that one of the many attractions of buying a Samsung flagship has so far been developer and custom ROM support that squeeze every last mile out of the hardware, and iron out the software kinks faster than Samsung does, an eventual developer reluctance is not good news for future S 4 owners that like to tweak. Most buyers aren't hacking and modding, though, so this might not be a dealbreaker for them. What do you think?

source: CM (G+) 

Lookout Security app protects Samsung Galaxy smartphones against lock screen hacking

If you're a Samsung Galaxy S III or Note II owner and that lock screen bypass hack won't let you sleep at night, here's a software solution to the problem provided by the guys at Lookout. The fix comes as a part of their "Lookout Security & Antivirus" application, which is available for free from the Google Play store. Those who have the app already installed will just need to update it to the latest version in order to get the extra protection.

For those who have missed the news, several days ago it was discovered that a lock screen PIN or pattern set on a Samsung Galaxy Note II or Galaxy S III running Android 4.1.2 could be bypassed in a matter of minutes. Once executed properly, the hack would allow complete access to the phone's interface, app drawer, and the user's private data. According to Lookout, the aforementioned application protects Samsung Galaxy S III mini smartphones as well from being exploited.

Samsung has yet to release an official patch for this vulnerability. That said, if you have a Galaxy S III, S III mini, or Note II and your privacy is of utmost importance, perhaps you might want to give the Lookout Security app a try.

source: Lookout

LG Optimus 4X HD's bootloader finaly opens

Now open is the bootloader on the LG Optimus 4X HD
Now open is the bootloader on the LG Optimus 4X HD
The LG Optimus 4X HD was launched last summer, powered by a quad-core NVIDIA Tegra 3 processor, and with Android 4.0.3 installed. However, with a bootloader that was locked down as tightly as Fort Knox, the hackers and modders tended to stay away from this model. But something has changed. Thanks to a leaked version of Android 4.1, opening the bootloader on the handset became an easier task and has now been accomplished. And with the guys at XDA quickly coming up with a ClockWorkMod recovery, it's a whole new world for owners of the unit.

We should let you know that shoehorning ROMs on the LG Optimus 4X HD is a bit more difficult than doing so on other smartphones. This increases the risk that something could go wrong. Keep in mind that simply unlocking the bootloader is grounds for voiding the warranty on the phone. But besides that, there is always the chance that you might end up bricking the device and while a nice looking paperweight can always spruce up a plain looking desk, that is not the intended purpose of the device. Make sure you know what your doing before you even start.  

source: XDA 

HTC Sense 5.0 hacked to run on the Droid DNA

HTC Droid DNA was outed as the first handset with a Full HD 1080p display, and Verizon was graced with the exclusive privilege to carry it. One downside of Big Red's phones is the slow rate of software version updates and customizations, but that's why we have the XDA-Dev forums and enthusiasts.

Thanks to them, the Droid DNA is being loaded with HTC's newest Sense 5.0 UI, before the first phone officially carrying this interface - HTC One - has even hit the market.

Most everything is working, save for the highly specific Zoe media collage software, and the MMS messaging system. If you are interested, head over to the XDa-Devs thread in the source link below for a test drive of the new, minimalistic Sense 5.0 on your trusty Droid DNA.

source: XDA-Devs

Samsung Galaxy S III flaw bypasses lock screen (again)


Several days ago, a flaw in the Samsung Galaxy S III interface was discovered allowing access to the phone's home screen even when a PIN or pattern lock screen was enabled. That hack, however, didn't seem as much of a threat given how little time one had to actually do something naughty with the targeted device. Yet now, another vulnerability that works in a similar fashion has been found and it pretty much bypasses the lock screen indefinitely. And that's a pretty serious privacy concern.

Here's how the hack works: from the lock screen press the "Emergency Call" button at the bottom. Then quickly press the emergency contacts button (bottom left), then the home button and then the lock key. If done properly, the next time the lock key is pressed it will take you to the Samsung Galaxy S III home screen. 

Note that this hack does not work every time. First time we tried bypassing our Galaxy S III lock screen it took us about 10 minutes of trying. But then we got the hang of it and managed to hack it within 10 attempts. Also, the one who discovered the vulnerability notes that having screen auto-rotation enabled increases the chances of the hack to work. Strangely, although the hack gives access to all apps and home screens, the notification bar remains inaccessible. This flaw appears to affect Samsung Galaxy S III units running Android 4.1.2. (UPDATE: Samsung Galaxy Note II is vulnerable as well.)

So all of you, guys, holding on to a Samsung Galaxy S III protected by a PIN or pattern, keep in mind that it isn't as secure as it should be. Hopefully, Samsung will address the issue in a timely manner.

source: Seclists.org 

Koush's Superuser app hits Google Play and is already integrated with CyanogenMod

We've been watching the progress of Koush's new ClockwordMod Superuser app for Android, and the road to the Google Play Store has been completed. Koush's Superuser app was launched into the Play Store yesterday, it has already gotten an updated with a number of bugfixes, and integrated with CyanogenMod.
The app that was released was quite like the version that hit open source exactly one week ago. ClockworkMod Superuser offers multiuser support, logging and per app logging, PIN protection, request timeouts, customizable notifications, ability to handle concurrent superuser requests, support for x86 and ARM, and a pretty UI, including tablet optimization. The app has also already gotten a number of bugfixes. 

And, literally as we were writing up this post, Koush announced that his new Superuser settings have been integrated with CyanogenMod, and can already be found in the system settings of the newest daily build of CM. 

source: Google Play & Koush 1 & 2

The White House responds: phones and tablets should be unlockable

The system looks like it's working. We the people signed a petition on We The People. We wanted our voices heard on the topic of being able to legally unlock our carrier-locked cell phones, and the White House has responded. And, interestingly, the White House fully agrees with our complaints, and wants to go a step farther and make sure that tablets are free to be unlocked as well.

The White House response said that a group of experts in "telecommunications, technology, and copyright policy" was pulled together last week to discuss the issue, and there was agreement that consumers should be able to unlock phones and tablets as they wish. 
This is particularly important for secondhand or other mobile devices that you might buy or receive as a gift, and want to activate on the wireless network that meets your needs -- even if it isn't the one on which the device was first activated. All consumers deserve that flexibility.
And, the response gives a few options for how the laws can be changed to make this happen. One possibility is to change the law so it is clear that "neither criminal law nor technological locks should prevent consumers from switching carriers when they are no longer bound by a service agreement or other obligation." The White House also said that the National Telecommunications and Information Administration (NTIA) would be working with the FCC in its efforts to change the laws, as stated by the FCC chairman last week. 

Lastly, the response included a call to wireless carriers to "ensure that their customers can fully reap the benefits and features they expect when purchasing their devices." That's a pretty broad thing to as of carriers, but we have heard that some carriers are already helping users to unlock devices at the end of their contracts, but that was part of the original DMCA agreement, requiring "carrier permission" to unlock your device. 

To go along with the response, the White House is asking people to fill out a survey on the topic, so be sure to do that. 

source: We the People

See a Nokia Lumia 820 shell being made using a 3D printer

While the Nokia Lumia 820 lacks many of the fancy features found on the Lumia 920 flagship, such as the PureView tech or the high-definition display, it comes with removable polycarbonate shells available in different colors and finishes. What's more is that one can even make their own unique shell, as long as they have access to a 3D printer and the necessary software. Isn't that awesome? Sure it is, and Nokia didn't miss the chance to demonstrate the 3D printing process during the MWC expo in Barcelona using hardware provided by MakerBot. 

In the video below you'll see a time lapse of the entire procedure, which takes a little over an hour to complete assuming you have a 3D model ready for printing. And since making your own 3D design from scratch won't be easy, Nokia has made the files necessary for 3D printing a Lumia 820 or Lumia 520 plastic shell are available online for those eager to use them.

So, what kind of shell would you come up with for a Nokia Lumia 820 or Lumia 520? Let us know in the comments!

Another day, another way to bypass the passcode discovered in iOS 6.1


Recently, a flaw was discovered in iOS 6.1 that allowed people to break into a passcode protected Apple iPhone. While the issue was not addressed in iOS 6.1.1 and iOS 6.1.2 updates, the security issue has become way too serious to avoid. As we previously told you, Apple has passed along to developers iOS 6.1.3 beta 2, which includes a fix for the initial passcode exploit.

iOS 6.1.3 could help fix the flaws
What we don't know is whether the new OS build includes a fix for another passcode flaw seen on a video produced by Vulnerability Labs. The video shows how the passcode lock can be disabled by dialing and then cancelling an emergency call while playing with the power button. The combination allows someone to gain access to your phone and view your photos and contacts list. The person could even load them on to a PC using a USB cord, whilebypassing your passcode protection.

Since the second flaw is connected to the first, it is hoped that iOS 6.1.3 will be able to close both openings at once. Apple has acknowledged the flaws but has not mentioned a timeframe for the release of the next update.

source: VulnerabilityLabsThreatpost

Koush releases open source ClockworkMod Superuser app

Koush is one of the undeniable stars of the Android developer community. He has been invaluable to the mod community by building ClockworkMod Recovery and ROM Manager. And now, Koush has done it again, releasing an open source ClockwordMod Superuser app.

If you have never rooted an Android device, a superuser app is what lets you to control what apps are allowed to have root level access, and when that access can occur. There are already a couple of superuser apps available, but when Koush releases one, the community takes notice. 

In addition to the basic functionality that you’d assume from a superuser app, ClockworkMod Superuser has multiuser support, logging and per app logging, PIN protection, request timeouts, customizable notifications, ability to handle concurrent superuser requests, support for x86 and ARM, and a pretty UI. Of course, it is also free and open source. Not a bad deal. 

If you want to give the app a shot, just head to the source. 

source: +Koush 

AOKP build for Android 4.2.2 released for 22 devices

If you're a fan of AOKP, today is a good day for you. The Android Open Kang Project has released the first build of its custom Android ROM that is based on Android 4.2.2 Jelly Bean. And, even better, the new version of AOKP adds more devices to the compatibility list, bringing the total to 22 devices.

The new version of AOKP is JB-MR1 Build 4, which adds various bug fixes, but more importantly is the first build using Android 4.2.2. Android 4.2.2 doesn't really add much for most users, but Nexus 7 users will enjoy the Bluetooth audio bug fix, and everyone else can just be contented to have the newest version of Android. 

The new build also adds support for the HTC One XL, Sprint Galaxy Nexus, and a bunch of Moto DROIDs: DROID 3, DROID 4, DROID Bionic, DROID RAZR (Verizon & GSM). For the full list of supported devices, and the ROM download, just hit the source.

source: AOKP

Surface RT hacked to run legacy x86 Windows programs

The entrepreneurial spirit over at XDA-Devs has managed to achieve another miracle - a beta tool has been making the rounds for about a month that lets you run legacy Windows apps on your Microsoft Surface RT tablet, rather than only apps from the Windows Store.

Don't get too excited, as for now you can't just fire up Photoshop or AutoCAD 2013 on the ARM-based slate, but the tool seems pretty handy anyways, at least for programs that are fairly light on resources like WinRAR or even games like Heroes of Might&Magic, which have been tested by the developer to work.

He encourages you to try his emulator and list in the thread what works and what doesn't, so he can get on it. The tool "emulates x86 instructions and passes Windows API calls to WinRT kernel with necessary modifications," and that's how running x86 apps on an ARM-based tablet is achieved. Naturally, your Surface RT needs to be jailbroken with a separate tool, and the other requirements are listed in the thread below.

source: XDA-Devs
All content of (Technology And Entertainment), design and layouts are Copyright 2012 PointMaza.Blogspot.com. All rights reserved.
Reproduction in whole or in part or in any form or medium without written permission is prohibited!
Privacy Policy - About Us - Contact Us

Subscribe now!