CM6 rooted phone - deleting file issues - myTouch 3G Slide General

I have successfully rooted and installed the official cm6 build on the mytouch3g slide. Everything works great except that even with root (RW) access in root explorer I cannot delete any files. It will dlshow as deleted successfully in the program. Yet it will be back when I really enter. I'm trying to remove some stock Google apps.
I think the problem is with SU permissions somehow. I also have an issue with adfree. It will not change my host file.
I can see uptop on the notification bar that SU permissions have been granted in these programs, but have the above issues. Please help!
Thanks
Sent from my Samsung Vibrant using XDA App

if I'm not mistaken, even w/ root access, we can't make changes to the system while it is booted. therefore you have to remove any unwanted programs with system mounted in recovery.

I have had no issues on a stock rooted Samsung vibrant so I know its possible
Sent from my Samsung Vibrant using XDA App

well we're not discussing the vibrant. we're talking about the slide. it's not possible. we need S-OFF to get /system mounted while booted. currently, that option is not available. therefore, root explorer will not work. as i said before, if you need to remove or make changes to any system files, do it in recovery.

GameOver69 said:
I have had no issues on a stock rooted Samsung vibrant so I know its possible
Click to expand...
Click to collapse
lol. My blender crushes ice pretty well too, how can I make the vibrant do it?

What about a program like adfree?
No way to get that working?
Sent from my Samsung Vibrant using XDA App

just adb push the hosts file to /system/etc
http://forum.xda-developers.com/showthread.php?t=722934

Related

Removing stock apps?

Coming from a Mt3g that I've ran exclusively with Cyanogen mod since I got it, I've become quite used to running a very slim, light phone, and getting this today with all this bloatware is driving me nuts. Anyone been successful getting these apps off theirs phones? I'm already rooted, and have astro installed, but didn't quite know what to remove.
Would prefer not having to use adb, as it doesn't work well with Win7
Use Root Manager and delete what u want. be careful what u delete tho.
how do u remove the icons of these crapps from the app menu?
After you delete them with root manager and re set the phone, they should be gone.
Yup. Granted I used ADB, but root manager will work too. Just make sure you delete the apk and the odex.
I deleted mine with root explorer .. worked fine for me...
Yep, I thought Astro had root access but I was wrong, snagged root explorer and cleaned my phone up rather nicely.
Any stock apps cause issues if removed?
try this thread. there are some u can remove and some you shouldn't remove.
http://forum.xda-developers.com/showthread.php?t=712546
Guys I know you can use root manager to delete the bloatware on this phone. How can you delete the .apk files using ADB? I searched but it doesn't seem to work. Any instructions on how its done.
http://www.careace.net/2010/05/12/how-to-remove-android-apps-through-adb/
Thanx but I thought you needed some type of recovery application. No?
Sent from my SAMSUNG-SGH-I897 using XDA App
I know this is a bit of a noob question. But I have been using root explorer to "move" apk and odec that I do not need. Is is that simple? There is no "uninstall" process, you just remove/delete the apk/odec?
That should be the same as rm -r in ADB and that's what I've been doing for the last couple of years. Proper or not, it does the trick
When I got the phone I think it had 4 pages of bloatware apps? I'm down to 2 and couldn't be happier.
I don't think the remount on root explorer works properly however, I had to remount between rw and ro with terminal.
ADB doesn't work well, I need to set up some sort of remote ssh so I can just run all of these commands from a shell on my desktop.

[STICKY][Patch][Rom]Malware Exploit for all pre-Gingerbread devices

Who is affected? All devices pre-gingerbread
Who should act? Users and developers using pre-gingerbread roms
How do I fix? Flash attached .zip at the bottom of this post
What if I think I was infected? Completely wipe your device, format sdard, go back to stock and re-apply rom, then flash the attached .zip (before installing any apps)
Why should I care? read below...
http://www.androidpolice.com/2011/0...your-phone-steal-your-data-and-open-backdoor/
Flash this with ClockWorkMod.... this is for any Pre Gingerbread ROM.... ie TNT anything, VEGAn 5.1.1 and below, Zpad anything, GAdam anything.
This is not necessary for any ROMS based off Gingerbread AOSP or CM7. Including VEGAn-TAB Experimentals.
Be Safe.
Even More Details here: http://www.androidpolice.com/2011/0...-android-nightmare-and-weve-got-more-details/
I checked out the zip and it just adds a blank text file (0 bytes) called profile to the /system/bin folder. So I am not sure what the fix is?
**EDIT** Nevermind it is a dummy file meant to prevent the virus. Thanks to the OP for providing this.
http://www.androidpolice.com/2011/0...your-phone-steal-your-data-and-open-backdoor/
Nasty stuff. I would say this patch is high priority and I'm already going through my own ROMs to add it in.
http://forum.xda-developers.com/showthread.php?t=977154
Link above has info on creating the file manually.
Jim
fyi -
http://www.pcworld.com/article/221213/keep_malware_off_your_android_phone_5_quick_tips.html
Lookout mobile security . In case you cannot find it via the market.
http://www.getjar.com/Lookout-Mobile-Security-with-Antivirus
Edit. I just installed the lookout app to scan my tab, everything was fine and then, i un-installed it since it was running on the background and taking 10% of the cpu..
Anyways, a nice app that can be used to do a quick scan..
I don't have a stock gtab but I'll ask anyways... how can our stock rom users be protected? Is there an alternate method?
Edit just saw the manual process. Im guess that's the way to go.
xmr405o said:
I don't have a stock gtab but I'll ask anyways... how can our stock rom users be protected? Is there an alternate method?
Edit just saw the manual process. Im guess that's the way to go.
Click to expand...
Click to collapse
I'd curious to see what all the vendors are going to do about this. Granted, they could just say that the Market is not there, but regardless the security hole is still there and needs to be plugged up.
Hi,
I hope that this isn't too offtopic, but I was trying to create /system/bin/profile using a term and su, and when i went into root explorer to make /system/bin R/W, root explorer showed the dir as R/W already, and as mounted on /dev/loop9.
Is that normal?
I haven't installed dataloop, at least intentionally, so it seems strange that /system/bin would be mounted there, plus it being R/W by default?
FYI, I use z4root to get temp root. Could that be why /system/bin is R/W?
Then again, that wouldn't explain the /dev/loop9 mount ...
Jim
jimcpl said:
Hi,
I hope that this isn't too offtopic, but I was trying to create /system/bin/profile using a term and su, and when i went into root explorer to make /system/bin R/W, root explorer showed the dir as R/W already, and as mounted on /dev/loop9.
Is that normal?
I haven't installed dataloop, at least intentionally, so it seems strange that /system/bin would be mounted there, plus it being R/W by default?
FYI, I use z4root to get temp root. Could that be why /system/bin is R/W?
Then again, that wouldn't explain the /dev/loop9 mount ...
Jim
Click to expand...
Click to collapse
Hi,
Creating the profile file manually, it wouldn't persist,i.e., it was gone after rebooting, so I installed gojimi's zip usung CWM, and that worked.
I also did a mount w/o getting temp root, and /system/bin is not on /dev/loop9, so I'm guessing that when z4root sets temp root, it might be remounting /system/bin on /dev/loop9 itself.
Jim
You would have to download one of those sketchy apps to really be affected anyways, right? Who would do that?!
Appreciate the patch. This highlights the two problems with android though, google fixed this security issue in 2.2.2, but most carriers still haven't released that update. And the market needs some oversight, not authoritarian apple like, but some.
Sent from my T-Mobile G2 using XDA App
Is it possible to sticky this thread
Mods is it possible to sticky this thread so that it is easily visible.
Thanks
Hello guys. Is there a way to find out if our tablet is infected or not?
I mean if we have installed any of the apps in the list that automatically means that we are infected or not?
If infected what is preferred to do wipe the tablet or go back to stock rom??
Is there any manual for windows 7 noobies users?
Thanks.
Doctor LeVa said:
Hello guys. Is there a way to find out if our tablet is infected or not?
I mean if we have installed any of the apps in the list that automatically means that we are infected or not?
If infected what is preferred to do wipe the tablet or go back to stock rom??
Is there any manual for windows 7 noobies users?
Thanks.
Click to expand...
Click to collapse
Please read the thread completely, it is stated you can download lookout security to run a scan to see if you are infected.
downloading.....see what happens
There is a DroidDreamKiller app that allows you to check to see if you are already infected and install the patch. There is also a beta test app that gives you other information. Just search the market for DroidDreamKiller.
To devs: Thank You
TO Everyone else DO THIS ASAP
How do I flash the zip file after downloading it?
Thanks
Start cwm using volume up while powering on.
Once menu comes up select install zip using vol buttons
Use home to select.
Navigate to where you saved zip file
Select it with home button
Once install complete reboot from cwmod
MODs Please make this a sticky . It is being overlooked.

God Mode? (solved)

How can I activate God Mode on a rooted XOOM? I want to nullify some stock apps, but Root Explorer is saying they are read only.
Thanks.
[edit] Changed the thread question.
LOL. I didn't know we were playing Quake.
What do you mean by god mode. You already have root. That's all you should need.
Sent from my Nexus One using XDA App
lol.
That might not be the correct term, and it may require a custom rom. Not sure, but on Project Elite for the OG Droid, there's an option under General>System called God Mode that gives you full access to files on the system. That may just be what Actngrezy calls it in PE.
I just want to rename some of the apps that were included on the XOOM. Specifically, I want to nullify the Quick Office apk so I can install the NI Adam version. When I navigate to the apk in Root Explorer, I get an error telling me it's a read only file. I never got that error with the Droid. I can change whatever I want to on that device.
Did you click on mount r/w in root explorer
arrtoodeetoo said:
How can I activate God Mode on a rooted XOOM? I want to nullify some stock apps, but Root Explorer is saying they are read only.
Thanks.
Click to expand...
Click to collapse
Did you install superuser? if so make sure you have allowed root explorer in it. Then on the top left hand side in root explorer hit mount r/w
arrtoodeetoo said:
lol.
That might not be the correct term, and it may require a custom rom. Not sure, but on Project Elite for the OG Droid, there's an option under General>System called God Mode that gives you full access to files on the system. That may just be what Actngrezy calls it in PE.
I just want to rename some of the apps that were included on the XOOM. Specifically, I want to nullify the Quick Office apk so I can install the NI Adam version. When I navigate to the apk in Root Explorer, I get an error telling me it's a read only file. I never got that error with the Droid. I can change whatever I want to on that device.
Click to expand...
Click to collapse
Im just visiting the forum to steal a few files to compare with atrix , how ever if i read your cleverly phrased question correctly and you are trying to remove/freeze some apps that came on the Xoom and you are getting read only error its because to modify anything in the /system dir you need to
1. back up anything you might remove via adb pull or via adb shell cp
2. adb shell
3.su
4. mount -o rw,remount (what ever the path to zoom block is i dont know cause i dont have one ) exp /dev/block/mmcblk0p12 /system
from there you can remove what ever you want out of system dir
5. exp. rm /system/app/quickoffice.apk
Thanks! I never noticed that button before. lol.
you can also get a system uninstaller in the market that will do it for you just the same, I usually use that in case there is more included than just the apk file
PaulG1488 said:
Did you click on mount r/w in root explorer
Click to expand...
Click to collapse
x 2
Sent from my Xoom using XDA Premium App
I thought about the uninstaller thing, but I'd rather not uninstall anything that came on the XOOM just in case. I just add an extra .null at the end of the apk (and associated files, which are easy to find) in case I need to restore them.
For instance, the NI Quick Office app force closes when you just breathe on the freaking tablet, so I had to restore the default one.

So what to do when I'm temp-rooted?

After having the phone for 3 weeks, today i finally temp-rooted.
Only because I needed to edit the root folder so that I can use ad-hoc internet, which stock android phones can't find. Well now it works and it feels pretty cool!
what else can I do now while I am temp rooted?
thunder9111 said:
After having the phone for 3 weeks, today i finally temp-rooted.
Only because I needed to edit the root folder so that I can use ad-hoc internet, which stock android phones can't find. Well now it works and it feels pretty cool!
what else can I do now while I am temp rooted?
Click to expand...
Click to collapse
Get rid of the annoying stock apps that come with the phone
i was trying to do that just now, but when i was in the application manager the uninstall button was still darkened out..
am I supposed to go to the superuser app and give it access first?
will uninstalling those stock apps have any effects? i still plan on continuing to use the stock htc sense rom as i see nth wrong with it.
No point because you're temp rooted, after a reboot.. they come back.
Sent from my T-Mobile G2 using Tapatalk
true. found that out the hard way.
sucks, even the wpa_supplicant that i editted will go back to the original which means i will lose adhoc again.
now everytime i want to use adhoc i will have to temp-root, then use root explorer to edit the wpa_supplicant.
since i used visionary to temproot and it has the permroot option, would doing so allow me to save all my file settings after root explorer?
would the permroot still be revertable using the unroot option?
all this for ad-hoc internet
thunder9111 said:
true. found that out the hard way.
sucks, even the wpa_supplicant that i editted will go back to the original which means i will lose adhoc again.
now everytime i want to use adhoc i will have to temp-root, then use root explorer to edit the wpa_supplicant.
since i used visionary to temproot and it has the permroot option, would doing so allow me to save all my file settings after root explorer?
would the permroot still be revertable using the unroot option?
all this for ad-hoc internet
Click to expand...
Click to collapse
If you're going to 'perm-root' then don't use visionary. Use the Gfree method, it's the most current and safest. I don't have the link to the G2 wiki right now but Google should find it for you. Rooting with Gfree is at the bottom section of the wiki.
I would use this method as it seems to be the quickess and user friendly one
http://forum.xda-developers.com/showthread.php?t=928160
noodles2224 said:
No point because you're temp rooted, after a reboot.. they come back.
Sent from my T-Mobile G2 using Tapatalk
Click to expand...
Click to collapse
I'm curious, even if you're only temp rooted, wouldn't remounting /system rw make any changes permanent?
noodles2224 said:
No point because you're temp rooted, after a reboot.. they come back.
Sent from my T-Mobile G2 using Tapatalk
Click to expand...
Click to collapse
Oh thats there was a way to disable them though so they wouldn't show up or even get ran. If memory serves you would go into terminal emulator, cd to the system/app directory, and then you would pm disable the apks that you didnt want
tan-ce said:
I'm curious, even if you're only temp rooted, wouldn't remounting /system rw make any changes permanent?
Click to expand...
Click to collapse
No. It's been a while since I've even thought about NAND locks and stuff but basically the system is protected from permanent changes unless the proper key is used. When you reboot your phone the system is compared to an image of it stored on the NAND and any changes are overwritten - sort of like a system restore on windows except it's automatic at every boot. That's how I understand it working from my memory.
KCRic said:
When you reboot your phone the system is compared to an image of it stored on the NAND and any changes are overwritten - sort of like a system restore on windows except it's automatic at every boot.
Click to expand...
Click to collapse
So do I correctly assume that s-off removes the locks?
Edit: Never mind the question, some searching paid off. Answer is yes.

Spare Parts app allowing /system mounting?

I just downloaded this version of Spare Parts, curious of what it could do
http://www.4shared.com/android/TgUtPlpK/comandroidspare_parts-1.html
It turns out that it actually has a feature allowing /system to be mounted as RW, I guess without root. I'm too scared to try it on my unrooted stock, because I'm afraid it will corrupt the directory or something. Anyone wanna try it? If it does, this solves the whole root for play store thing
Sent from a blaze of amazon using Tapatalk
I doubt this will actually work because you need root permissions to modify that directory. Root explorer has an option to mount rw though it does nothing without root and super user. If someone gets to work great though I am rooted and no longer running stock. So I can't test it unfortunately.
Sent from my Galaxy Nexus using xda premium

Categories

Resources