[MOD] Fix Protected Apps not Showing on FroYo - Nexus One Android Development

This is just a simple build.prop mod to fix the fingerprint back to the working ERE27 one used in CM. Everything in Settings still shows FroYo, but the Market sees you as ERE27 & thus gives you your protected apps back
To install run this from the directory you unzip the file to:
ADB Method:
Code:
adb remount
adb shell rm /system/build.prop
adb push froyo.prop /system/build.prop
adb shell reboot
Then, once it reboots, go into the dialer, and type
Code:
*#*#CHECKIN#*#*
which is
Code:
*#*#2432546#*#*
for those of you who are too lazy to read the letters
A message should pop up into the status bar after a few seconds depending on your connection speed saying checkin succeeded.
Now you're good to go, open Market and download away
EDIT: Since I know some of you will wonder what this does, it just changes the ro.build.fingerprint & ro.build.description settings back to ERE27. This alone would normally be enough, but you're depending on luck to when you next check in. Dialing that code in the Dialer will force a checkin.
EDIT 2: Thanks to Shafty023 here is a method for the shell:
LINUX SHELL METHOD
Copy froyo.zip to /sdcard, then open a Terminal shell on your phone
Code:
su
mount -o remount,rw /system
cd /system
mv build.prop new.build.prop
unzip /sdcard/froyo.zip
mv froyo.prop build.prop
rm /sdcard/froyo.zip
reboot
Upon booting back up, open Dialer and type in the following code
Code:
*#*#2432546#*#*
Once you see a notification in the notification bar that says checkin succeeded you can now open Market and are done.

Nice! Trying it now.
EDIT: Working great so far. Thanks!

athereal said:
Nice! Trying it now.
EDIT: Working great so far. Thanks!
Click to expand...
Click to collapse
testing it in a few minutes too.... [UPDATE: works like a charm!]

Nice job Geniusdog254! really nice
thanks!

Thanks, works great!

Grrr... adb has been broken for me for months. Any way to fix this without adb?

Part Four said:
Grrr... adb has been broken for me for months. Any way to fix this without adb?
Click to expand...
Click to collapse
Use one of the root file explorers to unzip the file, delete the old build.prop, put the new one in, and then type the command in the dialer

Works like a charm, thanks!

Worked great, THANK YOU!!!!!

I'm getting checkin failed. should I have renamed froyo.prop to build.prop?
edit: I'm able to see protected apps though.

So what happens when apps start getting udated to take advantage of JIT? If you have ERE27 signature do you get the JIT'less version of the apps? I know Replica Island is coming with a JIT version. I'm afraid to mess with anything right now, rather be patient and give it a few days.

dudebro said:
I'm getting checkin failed. should I have renamed froyo.prop to build.prop?
edit: I'm able to see protected apps though.
Click to expand...
Click to collapse
If you inserted this line correctly, it renames and places the file in its directory as build.prop
adb push froyo.prop /system/build.prop

Mikey1022 said:
If you inserted this line correctly, it renames and places the file in its directory as build.prop
adb push froyo.prop /system/build.prop
Click to expand...
Click to collapse
yeah, I was wondering if it worked because I was getting checkin failed.

bluehaze said:
So what happens when apps start getting udated to take advantage of JIT? If you have ERE27 signature do you get the JIT'less version of the apps? I know Replica Island is coming with a JIT version. I'm afraid to mess with anything right now, rather be patient and give it a few days.
Click to expand...
Click to collapse
Apps don't have to be updated to take advantage of JIT at all. They can be optimized but they can be optimized without JIT too. There are no different versions. JIT just converts the Java/Dalvik code into native code at app launch, instead of running it through the slower virtual machine. Its like C++ vs Java on a desktop, the native code (C++) is much faster when executed.
The only thing this will lead to is when apps start showing up in the Market as 2.2+ only, but by that point Google will have updated the market to recognize the new footprint.

Can someone give an example of a "Protected" app? If its worth anything, im assuming its paid apps. If so, i can see them without a modded build.prop.

serialtoon said:
Can someone give an example of a "Protected" app? If its worth anything, im assuming its paid apps. If so, i can see them without a modded build.prop.
Click to expand...
Click to collapse
I think Twidroid Pro is protected.
What I'm wondering is, if somebody swaps out the build prop but hasn't installed flash yet, would this block them from doing so?

serialtoon said:
Can someone give an example of a "Protected" app? If its worth anything, im assuming its paid apps. If so, i can see them without a modded build.prop.
Click to expand...
Click to collapse
Pure calender widget (agenda) is a protected app taht doesnt show up in the 2.2 market
Edit: Works perfect! Thanks.
If you are having problems with the checkin, make sure your on 3g and not WiFi.

Mi|enko said:
I think Twidroid Pro is protected.
What I'm wondering is, if somebody swaps out the build prop but hasn't installed flash yet, would this block them from doing so?
Click to expand...
Click to collapse
Nope, Flash still shows up in the Market top apps for me, but I already have it installed. Technically it probably should show up only on the 2.2 Market, but Google may not be able to filter that yet since they haven't enabled the 2.2 fingerprint yet. Just theories here, don't take anything I say too seriously
Also, a perfect example of protected apps is all the Gameloft apps. Search the Market for Gameloft. They won't show up on 2.2 without this, I tried multiple times

Geniusdog254 said:
Nope, Flash still shows up in the Market top apps for me, but I already have it installed. Technically it probably should show up only on the 2.2 Market, but Google may not be able to filter that yet since they haven't enabled the 2.2 fingerprint yet. Just theories here, don't take anything I say too seriously
Also, a perfect example of protected apps is all the Gameloft apps. Search the Market for Gameloft. They won't show up on 2.2 without this, I tried multiple times
Click to expand...
Click to collapse
Yea, im not getting any of the GameLoft games.

serialtoon said:
Yea, im not getting any of the GameLoft games.
Click to expand...
Click to collapse
Even after this?

Related

[How to] Gmail and the Android Market

THIS METHOD IS NOW OUTDATED.
For everyone that is starting from scratch with a wiped NookColor, I have made a linux script available that will do everything for you. This includes enabling apk installs on the device, live wallpapers, multitouch, etc. It will also download and install YouTube, Gmail, and the Market. It also changes the Market fingerprint to that of a Droid Eris on Verizon so you can see protected apps. It does not require use of the Android Emulator to generate an AndroidId as this is done automatically thanks to clockworx. All it does require is that you be nootered and have working Superuser.
Thread here:
http://forum.xda-developers.com/showthread.php?t=871210
DISCLAIMER:
These steps are what worked for me and some may not even be required. If this guide needs any clarification, post a reply and I will do my best to update it. I'm 99% certain all the steps are here.
If you have already tried to get the Market or other Gapps working, etc then it is very likely you will have to do a full factory reset before this will work for you. I have no idea why, but if these steps don't work I would try that first.
In my experience the factory reset is two steps:
8 failed boots restores the /system partition. You can easily trigger this reset without 8 failed boots by running this command from a Linux or Mac OSX command line:
echo -n -e "\008\000\000\000" > /tmp/foo; adb push /tmp/foo /rom/devconf/BootCnt; adb reboot
Click to expand...
Click to collapse
Afterwards:
Booting while holding power+volumeup+nook button restores /data
I had to do both of these steps in this order to get a full reset on the device.
Required:
nc_gapps.zip
system.img for AVD
Youtube for Eclaire
Optional:
Root Explorer really speeds this up. If you have it, I recommend using it as this tutorial is written with it in mind.
* Copy nc_gapps.zip onto the 4gb internal partition of the NC, /media/
* Unmount both the internal partition and the SD card (if applicable) from within your OS but leave the USB cable connected.
* Using a command prompt on your OS, navigate to android-sdk/tools (or platform-tools in newer SDK) and type the following:
adb shell
mount -o rw,remount -t ext2 /dev/block/mmcblk0p5 /system <-----This can be also done by going to /system/ in Root Explorer and clicking "Mount R/W" at the top
cd /media
miniunz -x nc_gapps.zip -d /system/ <-----Overwrite [A]ll if prompted!
echo "ro.config.nocheckin=no" >> /system/build.prop
exit
Click to expand...
Click to collapse
* Leave this command prompt open, we will need it in a minute!
* Install Youtube App. If you have a previous version installed it's best to use Titanium Backup to wipe it's data then uninstall.
* Run Youtube. Press Menu->My Channel. Log in with Gmail account. If you get the authentication error here you can try rebooting and wiping Youtube data again with Titanium Backup.
* Reboot NC
After reboot:
* Using the command prompt on your OS from before, type:
adb pull /data/system/packages.xml
Click to expand...
Click to collapse
*In this file find the string "uid.system". You should find a line that looks like:
<shared-user name="android.uid.system" userId="1000">
Remove the 3 lines beneath this one. They should look similar to:
<sigs count="n">
<cert index="n" />
</sigs>
n is an integer that may be different for everyone. After removing these lines, the line immediately after "<shared-user...>" should be "<perms>"
Save.
* Using the command prompt on your OS:
adb push packages.xml /data/system/
Click to expand...
Click to collapse
Reboot NC and disconnect USB.
Gmail should work but running the Market should load the TOS after which you will get a server error. This is caused by our device not having a valid androidId. Let's generate a valid androidId using the AVD emulator.
Create a new AVD for Android 2.1-API Level 7 using these settings:
SD Card Size: 100M
Skin: Built-in: Default (HVGA)
Hardware Properties:
Abstracted LCD Density: 160
Touch-screen support: yes
Device RAM size: 1024
Once the AVD is in your list, click on it and then click Details on the right hand side. Note the path and move the system.img you downloaded in that directory.
Start the AVD. When prompted, sign in with your existing Gmail credentials. Use CTRL+F11 to slide the keyboard in and out when prompted.
Run this command to get the androidId from the emulator:
adb shell sqlite3 /data/data/com.google.android.googleapps/databases/accounts.db "select * from meta";
Click to expand...
Click to collapse
It's the long number after androidId|, SAVE IT!
Now, connect your NC back to USB.
On the third command below, be sure to replace ANDROID_ID_FROM_EMULATOR with the number I just told you to save.
adb pull /data/data/com.google.android.googleapps/databases/gls.db
sqlite3 gls.db
update meta set intvalue='ANDROID_ID_FROM_EMULATOR' where name='androidId';
.q
adb push gls.db /data/data/com.google.android.googleapps/databases/
Click to expand...
Click to collapse
Reboot NC
Wow, that was quite a bit of work to figure out, to be sure.
Thanks, will give it a try!
Does this also provide the Google account setup capability (Reader, Listen, etc.)?
Thanks for the fix first of all!!!
I used root explorer and copied over all of the files recommended, then installed the youtube app you linked to, but when I tried to go to menu/my channel it flashes a message that there was a problem authenticating.
Any ideas?
Thanks!!!
Never mind...
Before doing the androidID stuff, Gmail is supposed to work? It doesn't. Just flashed for a sec and goes back to home screen
Also, there is no Market icon available. Am I supposed to install Vending.apk after putting it in /system/app?
EDIT: Youtube now doesn't work either...
EDIT2: Youtube works after an uninstall/reinstall, and I can sign in. Gmail still doesn't work and no market icon
bazzly said:
I'm confused....
"Using Root Explorer:
1) copy etc, framework, and lib folders into /system."
Those files are already in the /media/system directory....ohh...you talking the root /system not media/system....correct...?
Click to expand...
Click to collapse
Yes, that is correct.
bbtheory said:
Thanks for the fix first of all!!!
I used root explorer and copied over all of the files recommended, then installed the youtube app you linked to, but when I tried to go to menu/my channel it flashes a message that there was a problem authenticating.
Any ideas?
Thanks!!!
Click to expand...
Click to collapse
Try rebooting first. If that does not fix it then try clearing the data for the youtube app. If all else fails do a complete factory reset and start this from scratch. The youtube authentication issue was my biggest hurdle and I ended up doing a factory reset myself.
Xhorder said:
Before doing the androidID stuff, Gmail is supposed to work? It doesn't. Just flashed for a sec and goes back to home screen
Also, there is no Market icon available. Am I supposed to install Vending.apk after putting it in /system/app?
EDIT: Youtube now doesn't work either...
EDIT2: Youtube works after an uninstall/reinstall, and I can sign in. Gmail still doesn't work and no market icon
Click to expand...
Click to collapse
Same here...
Does the build.prop contain a valid version string which allows market access?
Also, there's a new version of the market going about too
Ok so I got past the youtube and now gmail works and the market gets the server error. However, I cant seem to get started with AVD to get the android ID... are there some more detailed instructions for an AVD noob???
bbtheory said:
Ok so I got past the youtube and now gmail works and the market gets the server error. However, I cant seem to get started with AVD to get the android ID... are there some more detailed instructions for an AVD noob???
Click to expand...
Click to collapse
Were there any variations from the steps above that you made to get gmail working? Not sure why mine is flashing then closing.
norkoastal said:
Were there any variations from the steps above that you made to get gmail working? Not sure why mine is flashing then closing.
Click to expand...
Click to collapse
No variations from the steps above other than fixing the permissions on the files that I copied over... They need to match the permissions of the other files in the respective folders.
Managed to get Gmail, Reader, and Market working. However, every download on the market fails. When I run a logcat i get "authentication failed"
I did replace androidId using the emulator.
Any ideas?
Nice! this works great! just tested out couple free apps from Market and both installed and worked fine. Thanks for figuring this out! finally I don't have to hunt for apk files
-----------
buy the way, AppBrain works fine with Market too.
From my pandigital days I have this question: does enabling google market and other apps prevent your nook color from staying in deep SLEEP?
Sent from my LogicPD Zoom2 using Tapatalk
I had an issue because I had not ever logged into youtube with my gmail account. I went to youtube.com and logged in, then was able to log in using the YouTube app.
Can someone plase post some AVD or emulator instructions??? That would be awesome!!!
For avd, you have to have the Android SDK installed. Then you can run (sdk folder)/tools/android to start the avd manager.
msid said:
For avd, you have to have the Android SDK installed. Then you can run (sdk folder)/tools/android to start the avd manager.
Click to expand...
Click to collapse
When I do that I get this message:
[INFO] Starting Android SDK and AVD Manager
'java' is not recognized as an internal or external command,
operable program or batch file.
bbtheory said:
When I do that I get this message:
[INFO] Starting Android SDK and AVD Manager
'java' is not recognized as an internal or external command,
operable program or batch file.
Click to expand...
Click to collapse
You need Java. (java.com)

SCRIPT: NookColor Auto Config

This script is not compatible with NookColor software 1.01. I will probably not be updating it. All of my work on Gmail, the Market, GTalk, and this script has been rolled into GabrialDestruir's AutoNooter sdcard image. I recommend using AutoNooter as it provides everything my script does with one less step and fewer requirements (like Linux).
UPDATE 12/15/10 - Version 1.2
ADDITIONS
* Modified Droid X Multitouch Keyboard
* Working Google Talk
UPDATE 12/13/10 - Version 1.1
BUG FIXES
* YouTube would sometimes fail to install because the package manager was not running
* Device might reboot in the middle of the script leaving the process incomplete
I wrote a linux script that will automatically do the following:
* Enable APK installs directly on the device
* Enable Live Wallpapers
* Enable Multitouch for certain apps (Google Maps, etc)
* Download and extract the Google Apps (Market, Gmail, etc) to the proper place on your NC and set permissions
* Download and install Youtube
* Edit build.prop and packages.xml to enable Gmail and Market, and Talk
* Generate an AndroidId for the Market. The Android emulator is no longer required.
* Modify the fingerprint of your device to emulate a Verizon Droid Eris running Android 2.1. This will let you access protected apps in the Market that would be otherwise hidden. (SlingPlayer is one)
Requirements:
* Already nootered and have Superuser
This script is intended automate much of the process after the first two requirements are met. I recommend a complete wipe, followed by nooter and z4root and then my script last.
If you are using a version of the SDK older than r08 (Android 2.3) make sure to open the script in a text editor and follow the instructions at the top.
You will need to connect the NookColor via USB. Be sure to eject both the 4gb internal partition (/media) and the sdcard from your OS before running my script!
From a terminal, cd to your adb directory and run these commands:
wget http://muffinworld.net/android/nookcolor/NookColor-Config
chmod +x NookColor-Config
sudo ./NookColor-Config
Click to expand...
Click to collapse
Press the Home button on your device. If you get the Google Setup Wizard, skip the sign in. Run the YouTube app and hit menu->My Channel. Log in with your Gmail account and press the Home button. Reboot device.
Gmail and the Android Market should work.
Awesome. Thank you!
I'll try before restore mi NC...
Edit:
can anyone help with the terminal stuff?
What terminal application is recomended and what settings are neccesary to input those lines?
thanks!
king conan said:
Awesome. Thank you!
I'll try before restore mi NC...
Edit:
can anyone help with the terminal stuff?
What terminal application is recomended and what settings are neccesary to input those lines?
thanks!
Click to expand...
Click to collapse
Are you running windows or linux? The commands listed here will likely only run under linux... and maybe cygwin?
I'm running windows...
Sent from my Nexus One using Tapatalk
Need a linux partition set up then methinks
idk if Cygwin would work properly with adb, too much stuff to go wrong imo.
I am assuming since it will think it is a Verizon Droid Eris then the NFL app will work also? This will be awesome since I watched part of the eagles game last night on the way home from my hockey game.
Awesome job...
I'm going to work on a Windows version of this script.
ZeroSX said:
Need a linux partition set up then methinks
idk if Cygwin would work properly with adb, too much stuff to go wrong imo.
Click to expand...
Click to collapse
Adb push in cygwin may work if you use nt paths, but I have yet to try. It fails using posix paths for the source.
Sent from my NOOKcolor using XDA app
xboxexpert said:
I'm going to work on a Windows version of this script.
Click to expand...
Click to collapse
Ditto - I'm working on one sans su and root, just sideload (more secure imo)
Sent from my NOOKcolor using XDA app
I modified the script to work on mac os - just remove the .txt extension.
You need to have the path to the sdk in your bash_profile.
Humm, OP I am not seeing the link to your script.
-CC
clockcycle said:
Humm, OP I am not seeing the link to your script.
-CC
Click to expand...
Click to collapse
You pull the script using wget.
Thanks for the effort. Does it work on Win7?
It seemed to work fine other than the live wallpapers bit, but nothing happens when I hit the home button.
Mistar Muffin said:
Gmail and the Android Market should work.
Click to expand...
Click to collapse
Mistar Muffin FTMFW!!!
GMail works! Market works! (Had to reboot once to get past the server unavailable message.)
And I was able to install FlightStats (which I purchased long ago and HIGHLY recommend for anyone who flys at all!)
Thanks a ton!
Patchthehippie said:
It seemed to work fine other than the live wallpapers bit, but nothing happens when I hit the home button.
Click to expand...
Click to collapse
My experience is once the settings.db change is applied for the App Install mod, the home button no longer works to return you to the home screen. I haven't figured out why yet unless it is a permissions issue on the settings.db file
EDIT: This is for the native NC Launcher. If you choose a Launcher replacement I don't think this is an issue.
windows version. Version 5 still buggy. Please hold off until I get a really universally working version
WOW,
thank you. I'll try it ASAP.
Got it! Thanks

[REF][Patch] Malware Exploit for all pre-Gingerbread phones

I'm posting this here for visibility for Fascinate users and ROM developers. In the following thread you can find all the information, as well as how to download and apply the patch files:
http://forum.xda-developers.com/showthread.php?t=977154
I'm sure it will be incorporated into the major ROM's soon. However, if you install apps from unverified sources, or regularly try out new apps from the market, you shouldn't wait.
Patching via CWM:
imnuts said:
Here are two zips if people want them and don't feel like going to another thread/page/topic/whatever.
DroidDreamMalwarePatch_pre-edify.zip
DroidDreamMalwarePatch_edify.zip
Click to expand...
Click to collapse
Patching via ADB or terminal emulator:
Alternatively, probably the quickest way (and if you copy and paste, the most fool-proof) if you are rooted and know how to use ADB, is to open up a command prompt or a terminal emulator on the phone to access the adb shell. If on a PC, type:
Code:
adb shell su
Then type the following lines, omitting the $ and # (if you are on a terminal emulator, start here):
Code:
$ su
# mount -o rw,remount /dev/block/stl9 /system
# touch /system/bin/profile
# chmod 444 /system/bin/profile
You are now protected from the current iteration of DroidDream Malware. Consider installing a security program like LookOut to protect against future vulnerabilities.​
Original Post:
Rodderik said:
[Patch][Rom]Malware Exploit for all pre-Gingerbread phones
Who is affected? All phones pre-gingerbread
Who should act? Users and developers using pre-gingerbread roms
How do I fix? Flash attached .zip at the bottom of this post or use one of the alternate methods down there
What if I think I was infected? Completely wipe your device, format sdard, go back to stock and re-apply rom, then flash the attached .zip (before installing any apps)
Why should I care? read below...
http://www.androidpolice.com/2011/0...your-phone-steal-your-data-and-open-backdoor/
Link to publishers apps here. I just randomly stumbled into one of the apps, recognized it and noticed that the publisher wasn’t who it was supposed to be.
Super Guitar Solo for example is originally Guitar Solo Lite. I downloaded two of the apps and extracted the APK’s, they both contain what seems to be the "rageagainstthecage" root exploit – binary contains string "CVE-2010-EASY Android local root exploit (C) 2010 by 743C". Don’t know what the apps actually do, but can’t be good.
I appreciate being able to publish an update to an app and the update going live instantly, but this is a bit scary. Some sort of moderation, or at least quicker reaction to malware complaints would be nice.
EDIT: After some dexing and jaxing, the apps seem to be at least posting the IMEI and IMSI codes to http://184.105.245.17:8080/GMServer/GMServlet, which seems to be located in Fremont, CA.
I asked our resident hacker to take a look at the code himself, and he’s verified it does indeed root the user’s device via rageagainstthecage or exploid. But that’s just the tip of the iceberg: it does more than just yank IMEI and IMSI. There’s another APK hidden inside the code, and it steals nearly everything it can: product ID, model, partner (provider?), language, country, and userID. But that’s all child’s play; the true pièce de résistance is that it has the ability to download more code. In other words, there’s no way to know what the app does after it’s installed, and the possibilities are nearly endless.
Click to expand...
Click to collapse
The offending apps from publisher Myournet:
* Falling Down
* Super Guitar Solo
* Super History Eraser
* Photo Editor
* Super Ringtone Maker
* Super Sex Positions
* Hot Sexy Videos
* Chess
* ????_Falldown
* Hilton Sex Sound
* Screaming Sexy Japanese Girls
* Falling Ball Dodge
* Scientific Calculator
* Dice Roller
* ????
* Advanced Currency Converter
* App Uninstaller
* ????_PewPew
* Funny Paint
* Spider Man
* ???
Click to expand...
Click to collapse
http://www.androidpolice.com/2011/0...-android-nightmare-and-weve-got-more-details/
Now, on to some more details of the virus. We should point out that this vulnerability was patched with Gingerbread, meaning any device running Android 2.3+ should be fine. In other words, if you’re looking to play the blame game (which I’m not, but having read all the comments on the original post, many people are), then there’s plenty to go around. The hole was fixed by Google, but it’s relatively useless since many phones aren’t yet running a version of Android that is protected. It’s noteworthy that some manufacturers released updates that patched the exploit for devices without updating to Gingerbread; unfortunately, it appears that minority is quite a small one.
Perhaps most important is the question of what infected users can do about their situation; unfortunately, the answer is not much of anything. Because the virus opens up a backdoor and can bring in new code at any time, the only way to really rid an infected device of any damage is to completely wipe the device – not exactly the optimal solution, but it looks like the only one available, at least for now.
Finally, Justin notes that ROM developers working with pre-Gingerbread versions of Android can prevent the virus from backdooring in code by putting a dummy file at /system/bin/profile.
Click to expand...
Click to collapse
As you can see androidpolice.com reports on this backdoor and roots and steals personal information. The apps are removed from the market but that doesn't mean they got them all. Attached is a flashable fix as suggested by androidpolice.com
So users can flash this .zip or simply create a blank file called profile and place it in /system/bin/ (developers are encouraged to include this file in future releases. A blank file is not going to affect performance at all)
Alternate methods:
Using 'adb shell' or terminal emulator (should work on any ROOTED phone) as suggest by xaueious here
Code:
$ su
su
# remount rw
Remounting /system (/dev/stl9) in read/write mode
# touch /system/bin/profile
# chmod 644 /system/bin/profile
#
Alternate 2:
Download blank profile file from here (or create one and name it profile)
Use a program like Root Explorer to copy it to /system/bin/
Then longpress on it and check the permissions should be read/write for user, read for group, and read for others.
Alternate 3:
cyansmoker has put together an apk for the patch here https://market.android.com/details?id=com.voilaweb.mobile.droiddreamkiller
Thanks for pointing this out photoframd and androidpolice.com for investigating and reporting!
UPDATE: I renamed the .zip file and reuploaded it (350 hits wow). Also in the edify scripted version I added 644 permissions to the file (but if you already flashed it then it should have defaulted to that). I also added a pre-edify version of the patch thanks to xaueious for people using a recovery that does not yet understand edify.
Click to expand...
Click to collapse
Thanks
Sent from my Rocking dj05, themed superdark w/o swype mod, voodoo 5, with custom boot and shutdown.. With premium xda app.
I would also recommend installing the free Lookout Mobile Security app. I find it to be very non-intrusive on my phone, no negligible battery drain or performance issues. Just scans any app you install, looking for bad stuff. Also does weekly full system scans, contact backup, and provides phone lock/alarm/location tracking features in case you lose it. Premium version has even more bells and whistles.
Posted from my EB01 SuperClean Fascinate with Voodoo
This has been stuck for the time being as it seems to be affected a BOATLOAD of users. Thanks for the linkage!
Here are two zips if people want them and don't feel like going to another thread/page/topic/whatever.
adb shell busybox touch /system/bin/profile
is all you need. Most fascinate kernels (of recent) have a bug, and /system is mounted as r/w.
So everyone should flash this no matter what rom you are using? Should we flash the new cwr also?
sorry delete
jcase said:
adb shell busybox touch /system/bin/profile
is all you need. Most fascinate kernels (of recent) have a bug, and /system is mounted as r/w.
Click to expand...
Click to collapse
adb shell chmod 644 /system/bin/profile
also?
NOsquid said:
adb shell chmod 644 /system/bin/profile
also?
Click to expand...
Click to collapse
This would probably be a good thing. Basically locks the file from being written to, right? Should I add it to the first post?
lasportsfan said:
So everyone should flash this no matter what rom you are using? Should we flash the new cwr also?
Click to expand...
Click to collapse
Yes.
All this is is a quick fix that will create a blank file. The current iteration of the malware checks to see if it already exists. This file fools it into thinking it already exists, so it moves on.
As you might guess, the author needs to only update his code to bypass this, in order for this to be an issue again.
And now that this is out, someone else will probably try it. Someone who is a little more thorough.
Moral of the story?
Be careful.
Consider running something like LookOut.
Backup your important data regularly.
As far as CWM goes, is there some kind of connection to the malware thing? Or just in general?
(If just in general, it's better to ask elsewhere as to not derail the thread).
Otherwise, I don't believe the newest (orange) clockwork recovery from ROM manager is fully compatible yet. Last I heard, it still had some bad binaries and 1 bad mounting point. Stick with the Red from JT's thread (which is the same bundled into SuperClean). Other than a couple superficial bugs that don't hurt anything, it works wonderfully and has more features than the orange CWM currently has.
GizmoDroid said:
This would probably be a good thing. Basically locks the file from being written to, right? Should I add it to the first post?
Click to expand...
Click to collapse
I dunno, it was in Rodderik's post but jcase didn't mention it. He's smarter than me, that's why I asked...
444 or 000 would be safer as that would prevent the file from being overwritten at all. 444 for read-only, 000 for no access.
If I never downloaded any of the apps in the list and have lookout on my phone is this neccesary to download or should i not be worried?
italysfinest327 said:
If I never downloaded any of the apps in the list and have lookout on my phone is this neccesary to download or should i not be worried?
Click to expand...
Click to collapse
Who should act? Users and developers using pre-gingerbread roms
Click to expand...
Click to collapse
I'd say that means you should be worried. Those apps listed are just the ones that were found on the market with them from one publisher. Just how virus's can get put into any application on a PC, the same can be done on phones.
Remember folks, our phones are just as exploitable as any other computer, so be careful!
good thing the patch came out!
imnuts said:
444 or 000 would be safer as that would prevent the file from being overwritten at all. 444 for read-only, 000 for no access.
Click to expand...
Click to collapse
Not sure whether Android interprets permissions differently from desktop Linux, but even if a file is 000 the owner can delete it on Debian. And root definitely can. If the file needs to be there for the root exploit to work, then this prevents it, but if they can run the root exploit and get root while this file is there then changing permissions on it will do nothing.
iofthestorm said:
Not sure whether Android interprets permissions differently from desktop Linux, but even if a file is 000 the owner can delete it on Debian. And root definitely can. If the file needs to be there for the root exploit to work, then this prevents it, but if they can run the root exploit and get root while this file is there then changing permissions on it will do nothing.
Click to expand...
Click to collapse
This is just another reason why I see this as a quick fix for what will need to have a much better one in the future.
If anyone hears of a more robust solution (besides using LookOut), let us know!
I navigated through Root Explorer to system/bin/profile and found a file there that reports
"01 Aug 08 06:00:00 rwxr-xr-x 0 bytes".
The 2008 date has me worried, although the 0 bytes means it is empty. Does anybody know if this is put there by FrankenClean 2.8 as a fix for this issue, or am I the only one on SuperClean seeing this (which would be bad!)
SupraLance said:
I navigated through Root Explorer to system/bin/profile and found a file there that reports
"01 Aug 08 06:00:00 rwxr-xr-x 0 bytes".
The 2008 date has me worried, although the 0 bytes means it is empty. Does anybody know if this is put there by FrankenClean 2.8 as a fix for this issue, or am I the only one on SuperClean seeing this (which would be bad!)
Click to expand...
Click to collapse
It is included in SC2.8. The 0 bytes is the best indicator that you are clean, since this patch is merely an empty file.
If you were infected, that file would actually have code in it.
For CWM 2.5.x.x DJ05, which one do you flash? or both?
DroidDreamMalwarePatch_pre-edify.zip
DroidDreamMalwarePatch_edify.zip
Thanks and sorry for the trouble, just wanted to be sure.

Asus Transformer Browser APK - Working Labs

here's asus's version of the browser apk.
you get the thumbscrolling and working labs.
you lose being able to back page from a flash site (takes about 4-6 quick backs to go back) and you lose some ua strings. only tablet, desktop and mobile-phone are available, so since you can't pick ipad some html5 sites won't stream right since they haven't added android tablet recognition.
back up your browser and browser.odex files.
would it be possible to come up with our own custom browser when source is released?
why dont you just use the one from your tablet?
G1_enthusiast said:
why dont you just use the one from your tablet?
Click to expand...
Click to collapse
missing labs option so no quick controls for those who may want it and missing thumb scroll bar.
No offense but you might wanna return your tablet then.. Which version do you have and why would you wanna lose those features??? Just saying..
Those are very nice features but not worth keeping a transformer or xoom over the tab 10.1.
I'm wondering though now that I'm rooted if I can just use this to replace the stock browser completely.
Woohooooo. Replaced the stock browser that came with it and installed this one into the system/app folder. Working great... man I missed my thumb controls. Moreso because of the fullscreen mode...I hated how the address bar took up so much real estate.
Nice!!! Congrats!! I'm glad it all worked out..
jaybizza said:
No offense but you might wanna return your tablet then.. Which version do you have and why would you wanna lose those features??? Just saying..
Click to expand...
Click to collapse
never said what features i want or don't want. what this is is an option for those who might want... options maybe.
What is the best way to go about installing this ?
@madsquabbles: If you have enough patience to read and write Dalvik bytecode, you can make your own mods to the Honeycomb browser today. I modded my Galaxy Tab 10.1's browser to use Duck Duck Go instead of Google as default search, and it works fine. (For the patch and helper scripts, see github/Sakurina/mitsuki. I'd link, but not enough posts for that yet.)
@xManMythLegend: Back up the browser, uninstall the browser using the commands from CyanogenMod's wiki (the "Make a barebones system" page linked on the front page), and then installing the apk should work via adb. If you don't uninstall the browser beforehand, you'll run into an inconsistent certificates error message.
The downside is that using a custom browser breaks delta updates such as the 3.1 update; it tries to modify the browser, can't find it, and bails out.
Thanks. Without root wasn't sure ...it'd been awhile
Sakurina said:
@madsquabbles: If you have enough patience to read and write Dalvik bytecode, you can make your own mods to the Honeycomb browser today. I modded my Galaxy Tab 10.1's browser to use Duck Duck Go instead of Google as default search, and it works fine. (For the patch and helper scripts, see github/Sakurina/mitsuki. I'd link, but not enough posts for that yet.)
Click to expand...
Click to collapse
being that i want to make sure i stay rooted i'll only upgrade via custom roms or after root is found.
but thanks for the tip. i'd have quite a bit of learning to do in order to start playing with the code. maybe i'll dig around for the heck of it and see what samsung did to fix the back page button for flash sites.
i've got the xoom apk and gonna try that tonight and see what it offers.
madsquabbles said:
i've got the xoom apk and gonna try that tonight and see what it offers.
Click to expand...
Click to collapse
Please report back. Want to have best browsing option, this one seems to be 3 steps forward one step back.
Sakurina said:
@madsquabbles: If you have enough patience to read and write Dalvik bytecode, you can make your own mods to the Honeycomb browser today. I modded my Galaxy Tab 10.1's browser to use Duck Duck Go instead of Google as default search, and it works fine. (For the patch and helper scripts, see github/Sakurina/mitsuki. I'd link, but not enough posts for that yet.)
@xManMythLegend: Back up the browser, uninstall the browser using the commands from CyanogenMod's wiki (the "Make a barebones system" page linked on the front page), and then installing the apk should work via adb. If you don't uninstall the browser beforehand, you'll run into an inconsistent certificates error message.
The downside is that using a custom browser breaks delta updates such as the 3.1 update; it tries to modify the browser, can't find it, and bails out.
Click to expand...
Click to collapse
Cant install this. Tried adb and terminal both telling me read only.
ADB finds device adb shell doesnt respond to remount
terminal just says read only file when i try to remove.+
Rooted earlier today , updated sdk. Any thoughts ?
i believe you have to type "adb remount" first then you can write to the system.
i use root explorer b/c is easier for and i don't have to use a pc.
here's the link for the xoom browser. i didn't get a chance to try it out yesterday.
http://forum.xda-developers.com/showpost.php?p=14691456&postcount=4
madsquabbles said:
i believe you have to type "adb remount" first then you can write to the system.
i use root explorer b/c is easier for and i don't have to use a pc.
here's the link for the xoom browser. i didn't get a chance to try it out yesterday.
http://forum.xda-developers.com/showpost.php?p=14691456&postcount=4
Click to expand...
Click to collapse
I have not tried adb for quite some time so perhaps there is a problem with commands or the order I am trying. It always finds the device. Adb shell starts fine but fails on remount.
Root explorer also gave me read only but I was trying to replace the apk as I failed to uninstall per cyanogen wiki.
you have to click the r/o r/w button at the top in root expl (if this doesn't work then you're either not rooted, haven't installed su, or haven't given root expl su permissions). then rename your browser.apk to browser.apk.bak (or whatever) and same with the browser.odex. it's probably safer to back them up to you pc too.
then copy over the other browser.apk and fix the permissions.. forgot what it is, but it has to be the same as all the other apks 644 i think. reboot and launch the browser.
madsquabbles said:
you have to click the r/o r/w button at the top in root expl (if this doesn't work then you're either not rooted, haven't installed su, or haven't given root expl su permissions). then rename your browser.apk to browser.apk.bak (or whatever) and same with the browser.odex. it's probably safer to back them up to you pc too.
then copy over the other browser.apk and fix the permissions.. forgot what it is, but it has to be the same as all the other apks 644 i think. reboot and launch the browser.
Click to expand...
Click to collapse
Thank you. Got it working with root explorer.
Had to look up what 644 was.
http://www.droidforums.net/forum/at...-new-cyanogen-jrummy-ultimate-permissions.png
That pic helped.

BHT Installer (Basic Hacking Tools)

Hey guys, I came up with a basic set of tools which I find useful. You may redistribute , include in any custom ROMs and/or distributions.
This includes:
Rewrite /default.prop for ADB
Install and deploy busybox in /system/xbin
install bash, ipctool, strace, tcpdump, and viewmem binaries.
To install, you must be rooted.
Unzip the attached file
place it on your nook.
cd to the folder you installed
Run the following
Code:
sh /sdcard/BHT/run.sh
Please note, I use Android Market app QuickSSH to get into my nook terminal, your results may very.. I hope someone else grabs these files and makes it all more user friendly. I've got too many other things going on.
I encourage other developers to include these valuable debugging tools in their packages.
You, sir, are a monster! You get my vote.
Sent from my Nexus S using xda premium
AdamOutler said:
Hey guys, I came up with a basic set of tools which I find useful. You may redistribute , include in any custom ROMs and/or distributions.
This includes:
Rewrite /default.prop for ADB
Install and deploy busybox in /system/xbin
install bash, ipctool, strace, tcpdump, and viewmem binaries.
To install, you must be rooted.
Unzip the attached file
place it on your nook.
cd to the folder you installed
Run the following
Code:
sh /sdcard/BHT/run.sh
Please note, I use Android Market app QuickSSH to get into my nook terminal, your results may very.. I hope someone else grabs these files and makes it all more user friendly. I've got too many other things going on.
I encourage other developers to include these valuable debugging tools in their packages.
Click to expand...
Click to collapse
I can turn this into an apk, if you don't mind. By turn on adb with this method, adb will be rooted and the device will still be allowed to sleep?
brianf21 said:
I can turn this into an apk, if you don't mind. By turn on adb with this method, adb will be rooted and the device will still be allowed to sleep?
Click to expand...
Click to collapse
By all means. Please do.
My vote too. I just hope after you win that you keep up the great work on the Nook Tablet. The last two weeks or so have looked very promising towards getting custom roms on here and a lot of that has to do with Adam's hard work along with a few others
Nearly all of these are already in snowball-mod, but I'll include ipctool, and viewmem for the next release.
cfoesch said:
Nearly all of these are already in snowball-mod, but I'll include ipctool, and viewmem for the next release.
Click to expand...
Click to collapse
How did you get default.prop reread into memory? The only think I can see is the 2nd init hijack? Am I missing something a lot easier?
brianf21 said:
How did you get default.prop reread into memory? The only think I can see is the 2nd init hijack? Am I missing something a lot easier?
Click to expand...
Click to collapse
Note, I said "nearly all". I don't really see though how changing /default.prop would keep over reboots... rootfs is stored in memory and recreated every time, isn't it?
I've added the binaries to NT Hidden Settings. I have not implemented /default.prop swap yet. I have to play with hijacking init before I do. Thanks again.
brianf21 said:
I've add the binaries to NT Hidden Settings. I have not implemented /default.prop swap yet. I have to play with hijacking init before I do. Thanks again.
Click to expand...
Click to collapse
cool. where are you hosting that binary? I currently have a mirror set up at nook1.adamoutler.com for easy access... When someone gets a new device, they need to download 3 things onto their device to make it a real tablet.. nook1=hidden settings, nook2=homecatcher, nook3=market.. I may change 3 to launcherpro, but hidden settings is the number1 tool required for the nook Tablet.
AdamOutler said:
cool. where are you hosting that binary? I currently have a mirror set up at nook1.adamoutler.com for easy access... When someone gets a new device, they need to download 3 things onto their device to make it a real tablet.. nook1=hidden settings, nook2=homecatcher, nook3=market.. I may change 3 to launcherpro, but hidden settings is the number1 tool required for the nook Tablet.
Click to expand...
Click to collapse
Homecatcher? I mean, I understand if you want to keep using the B&N store and stuff, but if you don't care about the B&N stuff, then the hacked SystemUI.apk is a way better option than Homecatcher.
But then, you're advancing "launcher pro", while I would more generally say "any non-B&N launcher"...
I added another option to nt hidden settings to run adb as root. It doesn't require a reboot and it automatically turns off auto mount. I am using nemith's adbd.
remount / as rw
stop adbd
replace /sbin/adbd
remount / as ro
setprop to turn off auto mount
start adbd as root
It's not persistent after reboot, but it works and doesn't kill the battery. I am not going to bother with hkvc's hijacking init method, because it looks like you, hkvc, bauwks, and nemith will be able to replace the os soon. Thanks.

Categories

Resources