Skip to main content

What is root

What is root? What is a work of root ?? Plzz read here :-


Rootingis the process of allowing users ofsmartphones,tabletsand other devices running theAndroidmobile operating systemto attainprivileged control(known asroot access) over various Android subsystems. As Android uses theLinux kernel, rooting an Android device gives similar access to administrative (superuser) permissions as onLinuxor any otherUnix-likeoperating system such asFreeBSDorOS X.Rooting is often performed with the goal of overcoming limitations thatcarriersand hardware manufacturers put on some devices. Thus, rooting gives the ability (or permission) to alter or replace system applications and settings, run specializedapplications("apps") that require administrator-level permissions, or perform other operations that are otherwise inaccessible to a normal Android user. On Android, rooting can also facilitate the complete removal and replacement of the device's operating system, usually with a more recent release of its current operating system.Root access is sometimes compared tojailbreakingdevices running the AppleiOSoperating system. However, these are different concepts: Jailbreaking is the bypass of several types of Apple prohibitions for the end user, including modifying the operating system (enforced by a "locked bootloader"), installing non-officially approved applications viasideloading, and granting the user elevated administration-level privileges (rooting). Only a minority of Android devices lock their bootloaders, and many vendors such asHTC,Sony,AsusandGoogleexplicitly provide the ability to unlock devices, and even replace the operating system entirely.     Similarly, the ability to sideload applications is typically permissible on Android devices without root permissions. Thus, it is primarily the third aspect of iOS jailbreaking (giving users administrative privileges) that most directly correlates to Android rooting.OverviewRooting lets all user-installed applications run privileged commands typically unavailable to the devices in the stock configuration. Rooting is required for more advanced and potentially dangerous operations including modifying or deleting system files, removingpre-installed applications, and low-level access to the hardware itself (rebooting, controlling status lights, or recalibrating touch inputs.) A typical rooting installation also installs the Superuser application, which supervises applications that are granted root or superuser rights by requestingapproval from the user before granting said permissions. A secondary operation, unlocking the device'sbootloaderverification, is required to remove or replace the installed operating system.In contrast toiOS jailbreaking, rooting is not needed to run applications distributed outside of the Google Play Store, sometimes calledsideloading. The Android OS supports this feature natively in two ways: through the"Unknown sources" option in the Settings menu and through theAndroid Debug Bridge. However, some UScarriers, includingAT&T, prevented the installation of applications not on the Play Store infirmware,  although several devices are not subject to this rule, including theSamsung Infuse4G;   AT&T lifted the restriction on most devices by the middle of 2011.   As of 2011, the AmazonKindle Firedefaults to theAmazon Appstoreinstead ofGoogle Play, though like most other Android devices, Kindle Fire allows sideloading of applications from unknown sources,  and the "easy installer" application on the Amazon Appstore makes this easy. Other vendors of Android devices may look to other sources in the future. Access to alternateapps may require rooting but rooting is not always necessary.Rooting an Android phone lets the owner add, editor delete system files, which in turn lets them perform various tweaks and use apps that requireroot access.       AdvantagesAdvantages of rooting include the possibility for complete control over the look and feel of the device. As a superuser has access to the device'ssystem files, all aspects of the operating system can be customized with the only real limitation being the level of coding expertise.[9]Immediately expectable advantages of rooted devices include the following:    *.Support for themes, allowing everything to be visually changed from the color of the battery icon, to the boot animation that appears while the device is booting, and more.*.Full control of the kernel, which, for example, allows overclocking and underclocking the CPU and GPU.*.Full application control, including the ability to backup, restore, or batch edit applications, or to removebloatwarethat comes pre-installed on many phones.*.Custom automated system-level processes through the use of third-party applications.   *.Ability to install acustom firmware(also known as a custom ROM) that allows additional levels of control on a rooted device.Rooting varietiesThe process of rooting varies widely by device, but usually includesexploitingone or more security bugs in the firmware of (i.e., in the version of the Android OS installed on) the device. Once an exploit is discovered, a custom recovery image can be flashed which will skip thedigital signaturecheck of firmware updates. Thena modified firmware update can be installed which typically includes the utilities needed to runapps as root. For example, thesubinarycan be copied to a location in the current process'PATH(e.g.,/system/xbin/) and granted executable permissions with thechmodcommand. A third-party supervisor application, like Superuser or SuperSU, can then regulate and log elevated permission requests from other applications. Many guides, tutorials, and automatic processes exist for popular Android devices facilitating a fast and easy rooting process.The process of rooting a device may be simple orcomplex, and it even may depend upon serendipity. For example, shortly after the release of theHTC Dream(HTC G1), it was discovered that anything typed using the keyboard was beinginterpreted as a command in a privileged (root) shell. Although Google quickly released a patch to fix this, a signed image of the old firmware leaked, which gave users the ability to downgradeand use the original exploit to gain root access. By contrast, theGoogle-brandedAndroid phones, theNexus One,Nexus S,Galaxy Nexus,Nexus 4,Nexus 5,Nexus 6,Nexus 5XandNexus 6P, as well as their tablet counterparts, theNexus 7,second-generation Nexus 7,Nexus 9andNexus 10, can be boot-loader unlocked by simply connecting the device to a computer while in boot-loader mode and running theFastbootprotocol with the commandfastboot oem unlock.[13]After accepting a warning, the boot-loader is unlocked, so a new system image can be written directly to flash without the need for an exploit.DifficultiesIn the past, many manufacturers have tried to make non-rootable phones with more elaborate protections (like theDroid X), but they are usuallystill rootable in some way. There may be no root exploit available for new or recently updated phones, but one is usually available within a few months.     Some rooting methods involve use of the command prompt and development interface calledAndroid Debug Bridge(ADB), while other methods may use specialized applications and be as simple as clicking one button. Devices, or sometimes even different variants of the same device, can have different hardware configurations. Thus, if the guide, ROM, or root method used is for a device variant with a different hardware setup, there is a risk ofbrickingthe device.[15]Industry reactionUntil 2010, tablet and smartphone manufacturers,as well as mobile carriers, were mainly unsupportive of third-party firmware development. Manufacturers had expressed concern about improper functioning of devices running unofficial software[16]and related support costs. Moreover, firmwares such asOmniROMandCyanogenModsometimes offer features for which carriers would otherwise charge a premium, such astethering. Due to that,technical obstacles such as lockedbootloadersand restricted access to root permissions have commonly been introduced in many devices. For example, in late December 2011,Barnes & NobleandAmazon.com, Inc.began pushing automatic,over-the-airfirmware updates, 1.4.1 toNook Tabletsand 6.2.1 toKindle Fires, that removed one method to gain root access to the devices. The Nook Tablet 1.4.1 update also removed users' ability tosideloadapps from sources otherthan the official Barnes & Noble app store (withoutmodding).   However, as community-developed software began to grow popular in the late 2009 to early 2010,   and following a statement by theCopyright Office and Librarian of Congress (US) allowing the use of "jailbroken" mobile devices,   manufacturers and carriers have softened their position regardingCyanogenModand other unofficial firmware distributions. Some manufacturers, includingHTC,  Samsung, Motorola. andSony Mobile Communications. actively provide support and encourage development.In 2011, the need to circumvent hardware restrictions to install unofficial firmware lessenedas an increasing number of devices shipped with unlocked or unlockablebootloaders, similar to theNexusseries of phones. Device manufacturerHTChas announced that it would support aftermarket software developers by making the bootloaders of all new devices unlockable.   However, carriers, such asVerizon Wirelessand more recentlyAT&T, have continuously blockedOEMs, such as HTC andMotorola, from releasingretaildevices with unlocked bootloaders, opting instead for "developer edition" devices that are only sold unsubsidizedand off-contract. These are similar in practice to Nexus devices, but for apremiumand with no contract discounts.In 2014, Samsung released a security service calledKnox, which is a tool that prevents all modifying of system and boot files, and any attempts set aneFuseto 0x1, permanently voiding the warranty.  LegalityInternational treaties have influenced the development of laws affecting rooting. The 1996World Intellectual Property Organization (WIPO) Copyright Treatyrequires nations party to the treaties to enact laws against DRM circumvention. The American implementation is theDigital Millennium Copyright Act(DMCA), which includes a process for establishing exemptions for non-copyright-infringing purposessuch as rooting. The 2001European Copyright Directiveimplemented the treaty in Europe, requiring member states of theEuropean Unionto implement legal protections for technological protection measures. The Copyright Directive includes exceptions to allow breaking those measures for non-copyright-infringing purposes, such as to run alternative software,   but member states vary on the implementation of thedirective.AustraliaIn 2010,Electronic Frontiers Australiasaid that it is unclear whether rooting is legal in Australia, and that anti-circumvention laws may apply.  These laws were strengthened by theCopyright Amendment Act 2006.CanadaIn November 2012, Canadaamended its Copyright Actwith new provisions prohibiting tampering with digital locks, with exceptions including software interoperability.[29]Rooting a device to run alternative software is a form of circumventing digital locks for the purpose of software interoperability.There had been several efforts from 2008-2011 to amend the Copyright Act (Bill C-60,Bill C-61, andBill C-32) to prohibit tampering with digital locks, along with initial proposals for C-11 that were more restrictive,[30]but those bills were set aside. In 2011,Michael Geist, a Canadian copyright scholar, cited iPhone jailbreaking as a non-copyright-related activity that overly-broad Copyright Act amendments could prohibit.  European UnionTheFree Software Foundation Europeargues thatit is legal to root or flash any device. According tothe European Directive 1999/44/CE, replacing theoriginal operating system with another does not void the statutory warranty that covers the hardware of the device for two years unless the seller can prove that the modification caused the defect.[32]United KingdomThe lawCopyright and Related Rights Regulations 2003makes circumventing DRM protection measures legal for the purpose of interoperability but not copyright infringement. Rooting may be a form of circumvention covered by that law, but this has not been tested in court. Competition laws may also be relevant.  See also "Europe" section above.IndiaIndia's copyright lawpermits circumventing DRM for non-copyright-infringing purposes.  Indian Parliamentintroduced a bill including this DRM provision in 2010 and passed it in 2012 as Copyright (Amendment) Bill 2012.   India is not a signatory to the WIPO Copyright Treaty that requires laws against DRM circumvention, but being listed on the USSpecial 301 Report"PriorityWatch List" applied pressure to develop stricter copyright laws in line with the WIPO treaty.  New ZealandNew Zealand's copyright lawallows the use of technological protection measure (TPM) circumvention methods as long as the use is for legal, non-copyright-infringing purposes.This law was added to theCopyright Act 1994as part of theCopyright (New Technologies) Amendment Act 2008.SingaporeRooting might be legal in Singapore if done to provide interoperability and not circumvent copyright, but that has not been tested in court.United StatesUnder theDigital Millennium Copyright Actrooting is illegal in the United States except by exemption. TheU.S. Copyright Officecurrently grants phones an exemption to this law "at least through 2015".In 2010, in response to a request by theElectronic Frontier Foundation, theU.S. Copyright Officeexplicitly recognized an exemption to the DMCA to permit rooting. In their ruling, the Library of Congress affirmed on July 26, 2010that rooting is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed everythree years or else they expire.On October 28, 2012, the US Copyright Office updated their exemption policies. The rooting of smartphones continues to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset." However, the U.S. Copyright office refused to extend this exemption to tablets, arguing that the term"tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects.  The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013.  Tim Wu, a professor atColumbia Law School, argued in 2007 that jailbreaking is "legal, ethical, and just plain fun.". Wu cited an explicit exemption issued by theLibrary of Congressin 2006 for personal unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, abusiness decision that has nothing whatsoever todo with the interests protected by copyright" and thus do not implicate the DMCA.We did not claim that this exemption applies to those who help others unlock a device or "traffic" in softwareto do so. In 2010 and 2012, the U.S. Copyright Office approved exemptions to the DMCA that allow users to root their devices legally. It is still possible to employ technical countermeasures to prevent rooting or prevent rooted phones from functioning. It is also unclear whether it is legal to traffic in the tools used to make rooting easy.
Please Don't use for illegale porpose.

Comments

Popular posts from this blog

Wordpress hacking - How to install / run wpscan on windows xp / windows 7 / windows 10

HOW TO RUN WPSCAN ON WINDOWS Byrockstardevil Requirements: rubyinstaller Development Kit for rubyinstaller curl DLL for windows : libcurl.dll 1 - install rubyinstaller you must have Ruby 2.2.3 version . download links here : http://rubyinstaller.org/downloads/ for more info : https://github.com/oneclick/rubyinstaller/wiki 2 - install Development Kit for rubyinstaller download link : http://rubyinstaller.org/downloads/ how to install : https://github.com/oneclick/rubyinstaller/wiki/Development-Kit if you face that problem  "unknown encoding name -  (ArgumentError)" just type "chcp 1252" in cmd and hit enter 3 - install libcurl.dll A - Download libcurl.dll from : http://www.confusedbycode.com/curl/ B - copy libcurl.dll copy  libcurl.dll into ruby bin folder or wpscan folder and make sure to add it to your PATH. I also added .DLL to PATHEXT ex : C:\Ruby21-x64\bin\ you can visit : http://www.computerhope.com/issues/ch000549.htm to know to set the p

How To Generate Random IP Address Using JAVA ?

Today I'll Show You How To Generate Random IP Address... But First Why I Want This...Right...? Ans : If You Want Test Your Code That Whether It Is Recognizing The Machine By It’s IP Address Then You Had To Use This Code To Generate Random IP Address. So Here We Goooo.... private String generateIPAddress ( int p1 , int p2 , int p3 ) { StringBuilder sb = null ; Random r1 = new Random (); Random r2 = new Random (); Random r3 = new Random (); Random r4 = new Random (); String ip1 = Integer . toString ( b1 ); String ip2 = Integer . toString ( b2 ); String ip3 = Integer . toString ( b3 ); String ip4 = Integer . toString ( b4 ); String b1 = IpConverter . longToIp ( r1 . nextLong ()); String b2 = IpConverter . longToIp ( r2 . nextLong ()); String b3 = IpConverter . longToIp ( r3 . nextLong ()); String b4 = IpConverter . longToIp ( r4 . nextLong ()); //Now the I

3 Ways to Root Android 7.0 Nougat on Nexus Running Official AOSP [Update: Root Android 7.1]

3 Ways to Root Android 7.0 Nougat on Nexus Running Official AOSP [Update: Root Android 7.1] If you own a Nexus phone then chances are you have already updated your device with the latest official Android 7.0 Nougat firmware. This brings the newer firmware build number NRD90M to the Nexus range including the Nexus 5X, 6P, 9, 6, Nexus Player, and the Pixel C. Unfortunately, Nexus 5 and 7 were left behind. This has been a game-changing week for the Android community as you can now expect the new software for your Android device soon enough. It may either come officially from a manufacturer or unofficially from developers like CyanogenMod. Just like we saw the unofficial support for the  Nexus 5 and the Nexus 7  today. As the new AOSP source code is now available to developers, soon you may find Cyanogen 14 based custom ROMS releasing for several devices. Hence, to be ready, you may need to be rooted and also setup a custom recovery like TWRP on your device. So that once the CM 14 bas