In case you missed it back in June, the Palm Pre was rooted by extracting the Root ROM from a Palm tool used to reset a device with damaged software. A lot has been learned from examining the code inside that ROM but we’re most amused by one thing in particular. If you grew up in the 80’s there’s a pretty good chance you know the Konami Code by heart. So did the developers of WebOS, the firmware running on the Palm Pre. By inputting the familiar (UpUpDownDownLeftRightLeftRightBA) set of gestures the handset enters Developer mode for connection to the SDK which was leaked last summer but is now in open release.
root59 Articles
Unlocking Multitouch For Droid And Nexus One
We’re fans of pinch-zooming and that means multitouch. Although the interface is natively supported by both the hardware and operating systems of the Nexus One and Droid phones, it is locked out of the stock installation. You can make multitouch work on both handsets if you’re willing to do a little firmware alteration.
The coding has already been done for you, it’s a matter of loading a custom kernel. Both the Nexus One and the Droid have been rooted, and that’s what you’ll need to do to unlock multitouch with new firmware. In addition to gaining full access to the device OS, you’ll need to load up some different apps that support pinch zooming, etc. Luckily, these are readily available and you may like them better than the stock browser, maps, and photo applications.
Nexus One Rooted
You know it’s getting a bit ridiculous when hardware that hasn’t hit the streets is being rooted. That’s exactly what has happened, root access can now be achieved on the Nexus One. [Paul] found an exploit and packaged it nicely so that anyone can do it. We do wish he had shared the details of the exploit but we’re not complaining.
If you’re not in the know, the Nexus One is the fabled Google Phone now come to life. It’s slated for release in 2010 and some think that will be officially unveiled at a January 5th press conference. That’s right, unveiled. The device has been cracked yet it doesn’t officially exist. What it does do is join a growing number of rooted android phones.
[via Gizmodo]
Nook Rooted Without Being Opened
If you’ve got a nook, and wanted to get root privileges, but really didn’t want to open up your fancy new toy. We have good news. The people over at nookdevs have found that the nook looks for updates from the external microSD slot at boot time. Simply download the patch, load it and boot. Though it was previously possible to get root privileges before, you had to physically open the device. While we would have opened it anyway, we understand that there may be people who prefer not to.
How To Root A Nook
Here’s the latest in rooted consumer devices, nookdevs.com has rooted the Barnes & Noble Nook eBook reader. The process is extremely easy, as the operating system is stored on a 2GB SD card inside the device. In fact, once you have the case open the hard part is over. From there, the card should be backed up for safe keeping. Now mount the card, enable the Android Debug Bridge and reassemble. The Android SDK can then be used to log into a shell on the Nook wirelessly.
We’re not sure there’s much that can be done past this point yet. It’s up to you to get Doom running!
How To Write Udev Rules
Since the adoption of Kernel 2.6, Linux has used the udev system to handle devices such as USB connected peripherals. If you want to change the behavior when you plug something into a USB port, this section is for you. As an example, we will use a USB thumb drive but these methods should translate to any device handled by udev. As a goal for this exercise we decided to create a symlink and execute a script when a specific thumb drive was loaded. The operating system we used for this exercise is Ubuntu 9.04 Jaunty Jackalope. Continue reading “How To Write Udev Rules”
1-Click Android Rooting
In the last few days, rooting the T-Mobile G1 and myTouch 3G has become much easier. [Zinx] released FlashRec which lets you flash a new recovery image onto your Android phone. It takes advantage of Linux kernel vulnerability CVE-2009-2692. The app lets you backup your current image and then flashes Cyanogen’s Recovery Image 1.4. Once that’s done, you can use any custom Android build you want. Android and Me has documented the entire process on their site and points out the ridiculously large number of custom ROMs that are out there. Embedded below is a video from [unknownkwita] showing the rooting process.