[Sven Killig] Has managed to get his Nexus One into USB host mode. This allows him to plug in all kinds of peripherals such as web cams, keyboards, even a displaylink unit. This is fantastic as it really opens up the possibilities of this device. You can see that he now has an amazingly functional and portable system running. He mentions that it is pretty stable unless he runs big programs, we wonder if he has added any RAM to it. It is worth noting that the Droid can be USB host as well.
The Alex eReader has been rooted. This little handheld was the belle of the ball at CES 2010 when it came to eReaders. Now that is has been released into the wild it takes its place next to the heavy hitters that have already seen root access. If you’re unfamiliar, this device boasts a six-inch e-ink display and a 320×240 LCD touchscreen interface. Now that you can make it do your bidding, what are your plans for the $350 tablet? Let us know in the comments.
In case you missed it back in June, the Palm Pre was rooted by extracting the Root ROM from a Palm tool used to reset a device with damaged software. A lot has been learned from examining the code inside that ROM but we’re most amused by one thing in particular. If you grew up in the 80′s there’s a pretty good chance you know the Konami Code by heart. So did the developers of WebOS, the firmware running on the Palm Pre. By inputting the familiar (UpUpDownDownLeftRightLeftRightBA) set of gestures the handset enters Developer mode for connection to the SDK which was leaked last summer but is now in open release.
We’re fans of pinch-zooming and that means multitouch. Although the interface is natively supported by both the hardware and operating systems of the Nexus One and Droid phones, it is locked out of the stock installation. You can make multitouch work on both handsets if you’re willing to do a little firmware alteration.
The coding has already been done for you, it’s a matter of loading a custom kernel. Both the Nexus One and the Droid have been rooted, and that’s what you’ll need to do to unlock multitouch with new firmware. In addition to gaining full access to the device OS, you’ll need to load up some different apps that support pinch zooming, etc. Luckily, these are readily available and you may like them better than the stock browser, maps, and photo applications.
You know it’s getting a bit ridiculous when hardware that hasn’t hit the streets is being rooted. That’s exactly what has happened, root access can now be achieved on the Nexus One. [Paul] found an exploit and packaged it nicely so that anyone can do it. We do wish he had shared the details of the exploit but we’re not complaining.
If you’re not in the know, the Nexus One is the fabled Google Phone now come to life. It’s slated for release in 2010 and some think that will be officially unveiled at a January 5th press conference. That’s right, unveiled. The device has been cracked yet it doesn’t officially exist. What it does do is join a growing number of rooted android phones.
If you’ve got a nook, and wanted to get root privileges, but really didn’t want to open up your fancy new toy. We have good news. The people over at nookdevs have found that the nook looks for updates from the external microSD slot at boot time. Simply download the patch, load it and boot. Though it was previously possible to get root privileges before, you had to physically open the device. While we would have opened it anyway, we understand that there may be people who prefer not to.
Here’s the latest in rooted consumer devices, nookdevs.com has rooted the Barnes & Noble Nook eBook reader. The process is extremely easy, as the operating system is stored on a 2GB SD card inside the device. In fact, once you have the case open the hard part is over. From there, the card should be backed up for safe keeping. Now mount the card, enable the Android Debug Bridge and reassemble. The Android SDK can then be used to log into a shell on the Nook wirelessly.
We’re not sure there’s much that can be done past this point yet. It’s up to you to get Doom running!