[APP][SHARE] BusyBox 4 NON-ROOTED Phones - Galaxy Y GT-S5360 Themes and Apps

Customizing your phones with busubox doesnt need root any more...:laugh:
Busy Box for Non-Rooted Phones by xda member Jaredsburrows
Download here: https://play.google.com/store/apps/details?id=burrows.apps.busybox
Welcome to Busy Box for Non-Rooted Phones!
Send all suggestions to [email protected]
Required:
Android Terminal Emulator
chmod binary (this is for non-rooted phones, rooted phones will come with this binary)
All binaries are installed in: /data/data/burrows.apps.busybox/app_busybox/
Open your terminal via ADB or the Android Terminal Emulator and type: cd /data/data/burrows.apps.busybox/app_busybox/
Execute each binary with a "./" in front: ./ls
BusyBox for Non-Root features:
How to use Course Notes:
Click on "Install BusyBox" to download and install all the BusyBox binaries
Once installed, click on the BusyBox location and it will copy the path to the binaries to your clipboard to make it easy to get to them. Open your Terminal and change directory to the path!
BusyBox for Non-Root
Displays Android Version
Displays Android API
Displays the location of your chmod binary
Enjoy :laugh:
Original Thread : http://forum.xda-developers.com/showthread.php?t=2195692

Thanks for posting this!

Update
https://play.google.com/store/apps/details?id=burrows.apps.busybox
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Download here: https://play.google.com/store/apps/details?id=burrows.apps.busybox
Welcome to BusyBox for Non-Rooted Devices by Jared Burrows
http://www.burrowsapps.com/
Find me on Google+: https://plus.google.com/112325051207234074930?rel=author
Send all suggestions to [email protected]
Required:
✔ Android Terminal Emulator Application
After having a rooted phone for years, I know that there are plenty of applications that allow users to customize their phones; however, when I recently bought a brand new phone this year, I decided not to root it and I realized the main reason for rooting my phone was simply to obtain more linux tools. I made this simple application in order to help users simply install BusyBox without the hassle of being rooted!
All binaries are installed in: /data/data/burrows.apps.busybox/app_busybox/
In Terminal Emulator, Preferences: Initial command: export PATH=$PATH:/data/data/burrows.apps.busybox/app_busybox/
Provided extra Binaries:
✔ add-property-tag
✔ backup
✔ bash
✔ btool
✔ check-lost+found
✔ dexdump
✔ drm1_func_test
✔ hcidump
✔ hcitool
✔ iwmulticall
✔ latencytop
✔ librank
✔ micro_bench
✔ multitouch
✔ nano
✔ opcontrol
✔ openvpn
✔ oprofiled
✔ procmem
✔ procrank
✔ rawbu
✔ run_backup
✔ run_restore
✔ sane_schedstat
✔ scheduler
✔ scp
✔ showmap
✔ showslab
✔ sqlite3
✔ ssh
✔ ssmgrd
✔ strace
How to use BusyBox Non-root:
✔ Step 1: Click on "Install" to install BusyBox
✔ Step 2: Open your Terminal and change directory to the path!
Permissions requested:
✔ Internet: Download BusyBox (make sure you are on WiFi!)
✔ Script: Add PATH to Terminal
Tags: busybox busy box root checker root check root check, root checker , android root, verify root, check root, Superuser, administrator, root access, busybox check, su checker, su check, test root, root tester, rooting, superuser, sudo checker, user access, uid, gid, sh, admin, execute, developer, shell, bash hash encryption decryption Base64 Binary CRC32 GOST MD2 MD4 MD5 RipeMD128 RipeMD160 hash RipeMD256 RipeMD320 SHA-1 SHA-256 SHA-384 SHA-512 Tiger Whirlpool password security droid hack hacking encryption decryption hash hashes message digest algorithm secure cryptographic function checksum rom roms verifier MD5 checker Rivest comparison cyanogenmod cyanogen md5sum mand5 AES file encryption password
https://play.google.com/store/apps/details?id=burrows.apps.busybox
Find me on Google+
Follow me on Twitter
Read my About Me

Nice work Can u make tweaks Which is content of all tweaks like high velocity pure etc

Hi you all talented developers !
I am non-tech guy and I am finding it difficult to follow the steps mentioned above particularly the commands that need to executed in terminal emulator. I would be extremely thankful if any of you could give me step by step guide to install it in layman's language without elaborating the technical aspect. Plz help me.

Very useful. Thank you

Related

Securing your android after ROOT

Hello everyone,
Its been great to have root on your X10 using the method posted here:
http://forum.xda-developers.com/showthread.php?t=711907
Well, this method works all right but I did some investigating of my own to audit the state of the system after its been rooted. Thanks to the discussions you may find here: http://forum.xda-developers.com/showthread.php?t=712178, the original developers soon chose to update the Rooting tutorial with some additional steps (See post #2 and #4 of the rooting thread). This is all good, because now you have the real power to act as a the *real* superuser i.e uid 0.
Most of the discussions that follow are only intended for users who are well versed with general *NIX security and concepts about user ids, permissions and other things. So please disregard this post if you have no ideas of these concepts.
Ok, so first things first. I basically followed the root tutorial as it is all the way upto step3 (or step3a as in my case). Remember, you essentially have a rooted phone right after step2, step3/3a just adds the updated baseband firmware, which has no effect whatsoever on the subsequent things that you do to your phone.
Well essentially, what I did do was install the "su" binary and the "Superuser.apk" following in the lines of step4v2 (post #2 in root thread). These are essential to give you control over your system as without them you are simply relying on a hacked "sh" binary which runs with elevated privileges. Here are the file permission masks for the "sh" binary which gets installed after the FOTA in step2:
Code:
# ls -l sh
ls -l sh
-rwsrwsrwx root root 86944 2010-06-28 18:08 sh
#
Wait!!! This is *not* quite ok. What this means is that any process can use this binary to gain super user privileges. This binary is setuid and setgid root!!!
Well you might say that... so is the case for "su":
Code:
# ls -l su
ls -l su
-rwsrwsrwx root root 22120 2010-06-28 08:08 su
#
But, this is different because its use is controlled by the Superuser Whitelist application that was installed with Superuser.apk.
This difference is crucial because if any non-privileged application and process forks and execs "su", the Superuser Whitelist app would immediately post a notification screen on the phone and provide options to allow or disallow.
With the "sh" binary installed on your phone as it is, you are basically inviting *any* application to be able to do anything it wants to your phone... and all this without your knowledge!!!
To test this theory, all you need to do is simply install one of the terminal emulators floating around the market or use the one provided in the rooting thread under the step4/app folder and launch it. It straight away, launches you into a root shell. Here is a screen shot of what you can do this way:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
(Remember, no warnings, no notifications and all this can be done by any app under the hood)
Here is what you can do to make your phone more secure.
Step1: Download an alternative shell or simply change the permissions on the "sh" binary:
Code:
# cd /system/bin
# chmod 755 sh
Step2: In case you downloaded an alternative shell like "bash" and copied it under your /system/bin folder, simply get rid of the original "sh" binary and create a symlink to the one you download, for ex: bash:
Code:
# cd /system/bin
# rm sh
# ln -s bash sh
(Note: the above steps assume that you have /system mounted as rw, if you don't know what that means, then you should not be reading this, sorry)
Remember, when installing any alternative shell make sure that its permission mode is set to 755 or lower. I recommend to *never* set the setuid and setgid bits on the shell!!!
Here is what I did personally:
Installed bash from here: http://forum.xda-developers.com/showthread.php?t=537827
Installed it under /system/bin *without* the setuid and setgid bits
Removed the "sh" binary
Created a symlink named "sh" to the binary "bash"
This way, whenever I launch "adb shell" or use any terminal emulator on my phone, I always get a un-privileged shell. To get root, simply fire "su".
PS: This information is not intended for casual users who have limited or no knowledge of UNIX or UNIX like sytems like Linux, Adrdoid SDK commands like adb or don't know their way around if faced with a command line!!!
PS: Another post with some steps to properly secure the system: http://forum.xda-developers.com/showthread.php?t=712945
lmao..
http://forum.xda-developers.com/showthread.php?t=712945
zephyrix said:
lmao..
http://forum.xda-developers.com/showthread.php?t=712945
Click to expand...
Click to collapse
lol, you must've done this while I was writing mine!!
Anyways, its good to have this info out and I do point out some concepts detailing *why* this is a problem.
Definitely.
Make sure people have installed a proper way to elevate to root before attempting to change sh to not setuid, or they may screw themselves over lol
Thanks for your guide! Much appreciated would be an understatement.
is there any other way of testing that as using tht method in ur given picture now says read only error does this mean i successfully secured my root?
bcool15 said:
is there any other way of testing that as using tht method in ur given picture now says read only error does this mean i successfully secured my root?
Click to expand...
Click to collapse
Oh... I think I forgot to show this, but essentially you need to get the system partition into read/write mode as well. So it will be one more command before the write is attempted:
# mount -o remount,rw -t yaffs2 /dev/mtdblock2 /system
...
...
# echo "I can...
j4mm3r said:
Oh... I think I forgot to show this, but essentially you need to get the system partition into read/write mode as well. So it will be one more command before the write is attempted:
# mount -o remount,rw -t yaffs2 /dev/mtdblock2 /system
...
...
# echo "I can...
Click to expand...
Click to collapse
thats the command which stoppped wrkin so i just redid whole rooting procedure with new v3 update does it still need securing?
bcool15 said:
thats the command which stoppped wrkin so i just redid whole rooting procedure with new v3 update does it still need securing?
Click to expand...
Click to collapse
Dont worry about the example shown in the screen shot. That is just to illustrate what a setuid "sh" binary can do to your system.
j4mm3r said:
Dont worry about the example shown in the screen shot. That is just to illustrate what a setuid "sh" binary can do to your system.
Click to expand...
Click to collapse
this securing procedure isnt working on my new root any suggestions?
please
Regards,
bcool15 said:
this securing procedure isnt working on my new root any suggestions?
please
Regards,
Click to expand...
Click to collapse
Exactly what procedure are you referring to? The post is just meant to be a set of guidelines of a vulnerability that existed on the phone after it was rooted using "the root procedure" at the time this was posted.
If you have a "sh" binary on your phone which is setuid and setgid, then you have this vulnerability. I haven't updated the post with results from any new root procedures that have been posted since, but I suspect even the newer methods posted so far in the "root thread" don't get rid of the compromised "sh" binary.
Please ignore if you don't know what setuid and setgid means.

[FIX] Run init.d scripts at startup (corrected sysinit along with run-parts)

[ info ]
the reason i created this thread is that many custom kernels for our X10 are having the feature of running init.d scripts at startup, BUT the problem is that some ROMS dont have the necessary/correct files in place for executing those scripts...
so i am attaching a easy to flash update.zip which contains these missing files required for full functionality of executing startup scripts...
use the following files only if u are not able to execute init.d startup scripts on ur current ROM
[ requirements ]
rooted device with recovery installed
kernel/other modifications which support init.d script execution (via sysinit) [exec /system/bin/sysinit]
[ download link ]
update.zip flashable via xRecovery-0.3-GBready (amend syntax)
init.d-autorunner-v01.zip
[ additional info ]
i have added the following things in the update.zip:
corrected /system/bin/sysint file
run-parts binary in /system/xbin/run-parts (which is basically busybox 1.16.2 binary)
test/example script /system/etc/init.d/99test
CM7-FreeXperia ROM already supports this execution so no need to flash it on that ROM
if ur startup script is not correctly working then u need to make sure that u have the correct permissions on the script (just tick all 9 boxes using RootExplorer permissions pop-up)
let me know how it goes!
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
ENJOY!
reserved reserved
Hey Doom, Is this already implemented in Z's CM7 2.3.5 rom?
Aphex33 said:
Hey Doom, Is this already implemented in Z's CM7 2.3.5 rom?
Click to expand...
Click to collapse
i dont remember...
test it out...
if init.d scripts are getting executed w/o using this FIX then its already implemented
This solves the issues with wolf v4.0.4 with Doomkernel??
So i will retain back my init.d files...
Hey doom and other devs
How many copies of busybox we will have in roms
I mean why not just add special folder rtm ( run-time module ) and place our busybox there...
That would ensure that it is not overwritten and replaced by market or some external thing...
If you take look now we have devs placing busybox in /recovery/sh /xbin/sh /bin/busybox etc, etc ...
Let's not forget busybox has size 700 kB that is like almost 1 MB of wasted space per copy...
And all sh scripts can run using #!/path_to/busybox sh and let's not forget that run-parts are created by update-script in xbin or bin folder so making new copy of busybox as run-parts not needed
And sysinit can be as service in init file
service sysinit /path_to/busybox run-parts /system/etc/init.d
Hi Doom,
Thank you
aZuZu said:
Hey doom and other devs
How many copies of busybox we will have in roms
I mean why not just add special folder rtm ( run-time module ) and place our busybox there...
That would ensure that it is not overwritten and replaced by market or some external thing...
If you take look now we have devs placing busybox in /recovery/sh /xbin/sh /bin/busybox etc, etc ...
Let's not forget busybox has size 700 kB that is like almost 1 MB of wasted space per copy...
And all sh scripts can run using #!/path_to/busybox sh and let's not forget that run-parts are created by update-script in xbin or bin folder so making new copy of busybox as run-parts not needed
And sysinit can be as service in init file
service sysinit /path_to/busybox run-parts /system/etc/init.d
Click to expand...
Click to collapse
aZuZu u will have to check all busybox binaries... wht i found was NOT ALL busybox binaries support run-parts (u can check it ur self)...
there are symlinks created using update-script which are wrong... u should be using busybox --s -install command always...
anyways the problem is that some devs use busybox in /system/bin /system/xbin
some include busybox in ramdisk (/sbin)...
so simplest solution for run-parts is to use a small "<400kb" binary which handles this well...
BTW i already use the sysinit service for my other kernels (Arc/Play/etc...) [which is much more advanced]
the solution posted here is a generic one which should work for MOST kernels...
P.S.: having a small 400Kb file is not going to waste 350MB+ space of ur /system partition
DooMLoRD said:
aZuZu u will have to check all busybox binaries... wht i found was NOT ALL busybox binaries support run-parts (u can check it ur self)...
there are symlinks created using update-script which are wrong... u should be using busybox --s -install command always...
anyways the problem is that some devs use busybox in /system/bin /system/xbin
some include busybox in ramdisk (/sbin)...
so simplest solution for run-parts is to use a small "<400kb" binary which handles this well...
BTW i already use the sysinit service for my other kernels (Arc/Play/etc...) [which is much more advanced]
the solution posted here is a generic one which should work for MOST kernels...
P.S.: having a small 400Kb file is not going to waste 350MB+ space of ur /system partition
Click to expand...
Click to collapse
Hi my friend,
I think your idea is also based
so I want to try this script
Cheers,
tkymgr
thanks for your such nice information sharing with us in this forum so keep it up
@DooMLoRD: This does not seem to work on ICS.. any suggestions?
is sysinit 0755 or 0777 (chmod) ?
Is this supported for fera lab v20?
Sent from my Xperia X10 using xda premium
Works on any android device ?
Enviado desde mi GT-I9300 mediante Tapatalk

Top Super User apk - Root What's/How/Why

Introduction:
Purpose of this thread is sharing most useful applications for root users.
I'll try to keep this first post update.
What's root permissions:
Rooting is a process that allows users of mobile phones and other devices running the Android operating system to attain privileged control (known as "root access") within Android's Linux subsystem with the goal of overcoming limitations that carriers and manufacturers put on some devices.
Learn more
How to:
Easy root
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Why become root:
* Being root user is first step for every tweak or mod in your phone
* To install a recovery menu
* Uninstall unwanted stock Rom apps
* Changing your system's files
* Opportunity of installing exclusive root users apk
* For the pleasure of experiment
Why not:
Messing with /system can make run your phone worse if something goes wrong. Nothing that a backup, a a total wipe with SEUS or a brand new firmware with FlashTool, can't solve
Root apk:
Titanium Backup
You can backup, restore, freeze (with Pro) your apps + data + Market links. This includes all protected apps & system apps, plus external data on your SD card.
Root Explorer
Root Explorer is the ultimate file manager for root users. Access the whole of android's file system (including the elusive data folder!).
Wireless ADB
Use ADB over Wi-Fi with Wireless ADB
ROM Manager
* Flash your recovery to the latest and greatest ClockworkMod recovery.
* Manage your ROMs via a handy UI.
* Organize and perform backups and restores from within Android
* Install ROMs from your SD card.
* Install your favorite ROMs over the air
AnTuTu CPU Master
AnTuTu CPU Master is a tool for changing the CPU speed on a rooted Android Mobile Phone/Pad.
Superuser
Hook into your phone's power
Grant and manage Superuser rights for your phone.
Market Enabler
Market Enabler lets you access paid apps in Android Market
For some apps are just enabled for some specific country and not available to the other countries,so it is very difficult to download many high quality software.Market Enable lets you access paid apps from countries where paid apps are not yet available.
AdFree Android
AdFree removes most ads in the browser and other apps. It does this by nullifying requests to known host names in the system hosts file.
Android Terminal Emulator
Access your Android's built-in Linux command line shell.
BusyBox
BusyBox is a software application that provides many standard Unix tools, much like the larger (but more capable) GNU Core Utilities. BusyBox is designed to be a small executable for use with the Linux kernel, which makes it ideal for use with embedded devices. It has been self-dubbed "The Swiss Army Knife of Embedded Linux".
Font Changer
Font Changer allows you to switch the default system font on your Android device (will replace the keyboard font too for a fresh typing experience). It creates an automatic backup of the default fonts at the beginning. When removing the application it should be done from inside its settings to restore your default fonts.
ROM Toolbox
ROM Toolbox combines all the great root apps all tied up into one monster app with a beautiful and user-friendly interface.
MetaMorph
MetaMorph allows you to theme, patch, and mod your phone by adding or changing files on your system and apps.
CacheMate for Root Users Free
CacheMate for Root Users allows you to clear cache from your device in one click
Dual Mount SD Widget
This widget Modifies a setting that will allow you to mount your SD card to your phone and PC/Radio/ect at the same time.
Sixaxis Controller
Sixaxis Controller allows you to use your Sixaxis and DualShock 3 controllers in many of your favourite games and applications.
Quick Boot (Reboot)
Reboot your phone quickly. Boot into Recovery and Bootloader with one tap.
FaceNiff
Use it with extreme caution. And don't abuse
Chainfire3D
Chainfire3D sits between your apps and the graphics drivers, and can intercept and/or change commands between the two. Features include reducing texture size and quality to reduce memory use and potentially increase game performance, as well as increasing memory use potentially increase performance.
Swapper 2
Swapper is simple application for “extending memory”. Helps when you need some memory for non active applications (like music player + browser + maps + etc…).
awesome post!!!
thanks, very helpful indded
First post updated with new applications and qr codes.
Tip: if you're using Google Chrome or Chromium browser, and you like to see qr codes in Android Market, just go in your browser extensions and download Droid Code.
No need of configuration
Thanks for grate info.........
Great info......super su...install failed.... Any solution.... Thanks

[ROM][4.2.2][AOSP] » LiquidSmooth[UNOFFICIAL] »» Liquid-v2.9»NookTablet[Acclaim]

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
HTML:
#include
/*
* Your warranty is now void.
*
* I am not responsible for bricked devices, dead SD cards,
* thermonuclear war, or you getting fired because the alarm app failed. Please
* do some research if you have any concerns about features included in this ROM
* before flashing it! YOU are choosing to make these modifications, and if
* you point the finger at me for messing up your device, I will laugh at you.
*/
LiquidSmooth is an aftermarket firmware based on the Android Open Source Project.
We are dedicated to providing Android users with smooth, stable and fast Roms. We start with a fast, and lightweight modified AOSP base, and then add the features you crave!
Please feel free to look at and use our code on LiquidSmooth GitHub.
While we make every effort to test these builds as much as possible, we are not responsible for anything that may happen to your device, family, pets, or perception of reality. We ask that you do your part to know your device and know how to recover from problems before you flash!
Features:
- Google GCC 4.7 Toolchain
- O3
- Strict-Aliasing (Linaro)
- C++11 Mode
- Optimized String Handling Routines (Linaro/Sony)
- Misc other Linaro and Code Aurora Optimizations
- Customizable lockscreen buttons and sliders
- Chronus clock widget
- Customizable hardware and software keys
- Transparent navbar and status bar
- Customizable navbar ring
- Navigation bar widgets
- Customizable power menu
- Notification power widget
- Customizable quicksettings panel
- Statusbar mods
- Theme engine
- Quiet hours
- Volume rocker music controls
- Full Rotation
- Customizable battery and notification light
Download Links:
You can find LiquidSmooth Rom
Goo.im http://goo.im/devs/demetris/Acclaim/LiquidSmooth
V2.9 http://tinyw.in/fTSD
V2.4 http://d-h.st/425
Gapps:
http://goo.im/gapps/gapps-jb-20130301-signed.zip
Latest SuperSU V1.30 Package Attached, flash from recovery.
Cheers ​
This is Mine!
can't wait to try when I get home.
I'm preparing to flash it right now with the 1.52 kernel! Nice job Demetris!
Update: Running smooth as gold. Nice ROM Demetris! It's even fast at 300 mhz!
since SU is baked in, titanium backup cant seem to ask permission for root access.
Hi demetris.
I've downloaded and installed this ROM but I can't seem to get root access as apparently there's no superuser binary installed!??
I downloaded Superuser app by ClockworkMod from Google Play but that didn't help. Likewise the superuser app by ChainsDD failed to gain root access.
Do you (or anyone else) have any suggestions on how I should proceed?
TIA ...
A.
Can anyone tell me if this is working properly before I install? A bit nervous because although I'm doing fine with CM 10.1 nightlies, when I tried to use Paranoid Android, it nearly soft-bricked my NT. Luckily, I had CWM recovery on a spare sd card so I was finally able to get my NT to boot into recovery, but ever since I've been wary of trying any other ROMs.
Issue with SU access.
deboyz1014 said:
Issue with SU access.
Click to expand...
Click to collapse
About Tablet > tap build number 7 times, just like every other 4.2.2 rom...
Then go to Settings->Developer options->Root Access->Apps and ADB!
Really guys how many times we have to answer that? :fingers-crossed:
demetris_I said:
About Tablet > tap build number 7 times, just like every other 4.2.2 rom...
Then go to Settings->Developer options->Root Access->Apps and ADB!
Really guys how many times we have to answer that? :fingers-crossed:
Click to expand...
Click to collapse
Hi again Demetris.
I forgot to mention that I'd done that too but still no luck with gaining root. :crying:
A.
That's strange
ok lets troubleshoot then.
Download this su file link
Save it somewhere just incase you will need it.
Then enter adb shell from recovery and type this commands:
The "su" need some permissions (e.g. executable), so type:
On Linux: "./adb shell chmod 6755 system/xbin/su" (without the quotes)
On Windows: "adb shell chmod 6755 system/xbin/su" (without the quotes)
You are done at the command prompt, to leave it type:
On Linux and on Windows: "exit" (without the quotes)
Install some apps from Google Play
Install Superuser made by ChainsDD.
This app notifies and asks permission when a app wants root access.
Install BusyBox installer made by Stephen (Stericson)
This app makes it easy to install busybox.
Install BusyBox using the BusyBox installer.
Busybox is a collection of simple, but powerful, Linux utilities, that android doesn't come with by default. It is used by some apps like Titanium backup in order to do special operations
Install Root Checker made by Burrows Apps.
Small and simple app to verify root access is properly configured.
User Root Checker to check whether your device is correctly rooted.
In case these dont work push first the new su you downloaded to system/xbin:
On Linux: "./adb adb push <directory-with-su-downloaded>/su system/xbin/su" (without the quotes)
On Windows: "adb push <directory-with-su-downloaded>\su system/xbin/su" (without the quotes)
But there is already an su binary there so needing to do this is far fetched.
OK, i just searched for a superuser.zip file on google, found one, downloaded it, installed in cwm, rebooted, job done.
It's 4am here (and I'm back to sleep in a sec or two) but this is what I've got so far ...
Code:
C:\Data\Nook>adb devices
List of devices attached
2014530128844002 device
C:\Data\Nook>adb shell chmod 6755 system/xbin/su
Unable to chmod system/xbin/su: Read-only file system
C:\Data\Nook>
Like MickeyF reported:
http://forum.xda-developers.com/showthread.php?t=1929712
or
http://forum.xda-developers.com/showthread.php?t=1742522
or
http://forum.xda-developers.com/showthread.php?t=1835502
Once SU is sorted, I'm loving the speed of this ROM, great work dude, many thanks
Sent from my Barnes & Noble Nook Tablet using XDA Premium HD app
Yay, finally I've got SU access!!!!
Thanks Demetris for the links above.
The first one I tried was for an older Android version and didn't work.
However this one finally worked!
Anyhow, I really appreciate all the efforts you're putting in to these new ROMs.
My NT keeps getting better and I can put off a little longer my urges to upgrade to a Nexus7
It works with the SU fix. I installed the custom kernel (v1.66) and this is the smoothest rom i have ever used.
slgooding said:
It works with the SU fix. I installed the custom kernel (v1.66) and this is the smoothest rom i have ever used.
Click to expand...
Click to collapse
I am assuming that the attached UPDATE-SuperSU-v1.25.zip needs to be flashed in CWM. Please correct me if I am wrong.
Thanks!
fljoe said:
I am assuming that the attached UPDATE-SuperSU-v1.25.zip needs to be flashed in CWM. Please correct me if I am wrong.
Click to expand...
Click to collapse
That's correct.
Ok got this installed and running super smooth...buuuut I had to replace nova with trebuchet. Nova had an issue whenever I tried to remove or add a widget the screen would just rotate. Installed 1.66 with this as well and so far much better than the cm10.1 experimental which is what I've been running.

HP TOUCHPAD Universal Authority

Universal Authority to have Total control of all Android ROMs using Gscript
Before making any changes always create a back up.
Click HERE for How to Backup and Restore using TWRP Recovery
Have all the proper software available to be use, if any wrong doing.
The Novacom drivers are essential to repair any damages.
Click HERE for HP TOUCHPAD Novacom Repair Android
In any Device Operating System, Desktop or Mobile the changes are apply using simple command lines. There are Apps that allows easier interaction by providing a
GUI ( Graphical User Interface ). The Apps provide specific functions or Tweaks in a general setting to accommodate a wide range of Devices.
The Apps will use resources ( RAM ) and if the device is low in Memory it will create more issues than improvement.
The Gscript App provides the ability to make all changes to the system in a very basic, simple but effective way.
The developer and creator of Gscript is @rogro82, and the original Thread can be found here:
Click HERE for the original Gscipt Thread
The provided Gscript from this guide was modified to work better on the Tablet, but the functionality is the same.
The user has full Authority to modify any Android ROM and specifically create any script command for any use.
Creating the script is as simple as using the App.
Paste the command in the App, give it a name and save it.
A list of command can easily be enter on any OS using a basic text editor.
The only requirement is to save the file with the extension .sh
Flash the file in TWRP Recovery:
Boot into Android and install the gscript_modified.apk App. A list of scripts are provided to make changes to the Optimize Settings.
Click HERE to Download HpTp_Universal_Authority flash File.
SuperSu SR5-SuperSU-v2.82 must be flash to all ROMs:
Click HERE to Download SR5-SuperSU-v2.82
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Many thanks to @rogro82 for creating the most powerful App, that with a touch from the Home Screen everything is under control !
PIE Commands
Android Pie uses the Toybox:
http://landley.net/toybox/
The best and fastest way to get all the command available is using ADB Shell.
[email protected]:/ # cd system/bin
Get all available command line utilities
[email protected]:/system/bin # ls
or by just typing toybox
[email protected]:/ # toybox
Oreo Commands
Android Oreo uses the Toybox:
http://landley.net/toybox/
The best and fastest way to get all the command available is using ADB Shell.
[email protected]:/ # cd system/bin
Get all available command line utilities
[email protected]:/system/bin # ls
or by just typing toybox
[email protected]:/ # toybox
Nougat Commands
Android Nougat uses the Toybox:
http://landley.net/toybox/
The best and fastest way to get all the command available is using ADB Shell.
[email protected]:/ # cd system/bin
Get all available command line utilities
[email protected]:/system/bin # ls
or by just typing toybox
[email protected]:/ # toybox
Lollipop Commands
Android Lollipop uses the busybox:
https://busybox.net/
The best and fastest way to get all the command available is using ADB Shell.
[email protected]:/ # cd system/bin
Get all available command line utilities
[email protected]:/system/bin # ls
or by just typing busybox --list
[email protected]:/ # busybox --list
Kitkat Commands
Android Kitkat uses the busybox:
https://busybox.net/
The best and fastest way to get all the command available is using ADB Shell.
[email protected]:/ # cd system/bin
Get all available command line utilities
[email protected]:/system/bin # ls
or by just typing busybox --list
[email protected]:/ # busybox --list
Universal Commands
Universal Commands
Journey to Planet "Universal Authority"
Well while HP_TOUCHPAD is still trying to get out of his 'technical blackhole' one step at a time, I though I would take my first journey to the planet "Universal Authority" and report my findings, and to see if there is any life. I brought my trusty camera to document my journey and I added annotations to all my journey pictures at the bottom of the post.
First I downloaded the zip file called HpTp_Universal_Authority.zip and investigated it before I flashed it. The key file in the zip is called gscript_modified.apk and key the directory is called /gscript, both are important, these files will take permanent residence on your HP Touchpad
once you flash the zip.
The /gscript directory contains 20 separate Linux scripts that perform various tasks on your HP TOUCHPAD using Linux commands, the APK file is the modified gscript application that you will install once the flash copies it to the download directory. The updater-script of the zip has various edify commands that get run at flash time too.
So once I installed the modified gscrips app, I opened it and it was empty of any commands, so I added one at a time with the "add script" button. Then I did some testing on the planet "Universal Authority", by selecting the "run" and "edit" commands on the popup menu of the various scripts that I loaded.
It was a good first journey, and I plan to go again soon. I hope you all visit too, the natives are friendly and they have good home cooking. They told me that Captain Kirk and Spock were here and I just missed them.
Somehow missed this newcomer the other day while resurrecting one of mine.
Thanks @HP_TOUCHPAD for taking the time to post all this info.
Saw 'GScript' and my first thought was of GhostScript which is over 30 years old.
Going to have to rework my thought process...
DoubleStuff said:
...SNIP...
+1
It was a good first journey, and I plan to go again soon. I hope you all visit too, the natives are friendly and they have good home cooking. They told me that Captain Kirk and Spock were here and I just missed them.
Click to expand...
Click to collapse
How are the Craft Brews - any good?

Categories

Resources