Feeds

Kindle Fire gets root access

Bug, feature, or ‘don’t really care’?

Security for virtualized datacentres

You’d have to think that Amazon doesn’t really care whether people give themselves root access to its e-readers, since the Kindle Fire has been “rooted” two days post-launch.

A post to the XDA Developer forum signed death2all110 demonstrates that someone using the Android Debug Bridge and SuperOneClick 2.2 can get root access to the Kindle Fire.

It’s also necessary to have installed and used the ADB SDK, the post states, after which the adb_usb.ini file needs to have the 0x1949 address added.

By editing the USB driver info file, android_winusb.inf, allowing installation of apps from unknown sources, and killing the ADB server, a user can install SuperOneClick. After that, all that’s needed is to run the software to select the “root” option.

As one comment to the post observed, the Kindle is easy to root as well, which makes one wonder whether Amazon is particularly worried about how people treat their readers after purchase, irrespective of the company’s official statements.

With root access enabled, all that’s required to side-load Android apps from the USB is to enable the USB in ADB – running “adb devices” – and then load the package’s .apk file by running “adb install <app>.apk”. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.