<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Android Fan Network &#187; root</title>
	<atom:link href="/tag/root/feed/" rel="self" type="application/rss+xml" />
	<link>http://androidfannetwork.com</link>
	<description>Your favorite place for everything Android!</description>
	<lastBuildDate>Mon, 10 Feb 2014 21:39:33 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.8.1</generator>
	<item>
		<title>Greenify App No Longer Requires Root Access</title>
		<link>http://androidfannetwork.com/2014/01/22/greenify-app-longer-requires-root-access/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=greenify-app-longer-requires-root-access</link>
		<comments>http://androidfannetwork.com/2014/01/22/greenify-app-longer-requires-root-access/#comments</comments>
		<pubDate>Thu, 23 Jan 2014 01:00:15 +0000</pubDate>
		<dc:creator><![CDATA[David Quillinan]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Greenify]]></category>
		<category><![CDATA[root]]></category>

		<guid isPermaLink="false">http://androidfannetwork.com/?p=11271</guid>
		<description><![CDATA[<p>Over the past year, the Greenify app has become a hugely popular root-only app for users that like to conserve their RAM and battery life. Good news for those of you that either don&#8217;t have a root method for your device or rooting your devices isn&#8217;t your thing, but saving that battery life and RAM ...<a class="post-readmore" href="/2014/01/22/greenify-app-longer-requires-root-access/">read more</a></p><p>The post <a rel="nofollow" href="/2014/01/22/greenify-app-longer-requires-root-access/">Greenify App No Longer Requires Root Access</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></description>
				<content:encoded><![CDATA[<p><a href="/wp-content/uploads/2014/01/wpid-greenify.jpg"><img class="aligncenter size-full" title="greenify.jpg" alt="image" src="/wp-content/uploads/2014/01/wpid-greenify.jpg" /></a></p>
<p>Over the past year, the Greenify app has become a hugely popular root-only app for users that like to conserve their RAM and battery life. Good news for those of you that either don&#8217;t have a root method for your device or rooting your devices isn&#8217;t your thing, but saving that battery life and RAM usage is.</p>
<p>The Greenify app no longer requires a rooted device to enjoy the benefits that Greenify has to offer. The premise of Greenify is to allow you to hibernate apps that may be hogging that precious battery life and RAM without having to completely kill them or disable them in the way Titanium Backup does. Although there are permission restrictions that do require root access for apps to be in hibernation automatically, but the latest release has built in a new feature that somewhat automates the manual process of hibernating (and confirming) apps. There&#8217;s also an experimental feature that should take care of those persistent notifications that take advantage of your notification system.</p>
<p>That&#8217;s it folks! The beloved <a href="https://play.google.com/store/apps/details?id=com.oasisfeng.greenify&amp;hl=en">Greenify</a> app is now available to use for those of you that don&#8217;t have a rooted device and still fully available for us hackers.</p>
<p><a href="https://play.google.com/store/apps/details?id=com.oasisfeng.greenify&amp;hl=en">Google Play Store link for Greenify</a></p>
<p>The post <a rel="nofollow" href="/2014/01/22/greenify-app-longer-requires-root-access/">Greenify App No Longer Requires Root Access</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://androidfannetwork.com/2014/01/22/greenify-app-longer-requires-root-access/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Root and TWRP recovery for Oppo N1</title>
		<link>http://androidfannetwork.com/2013/11/23/root-and-twrp-recovery-for-oppo-n1/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=root-and-twrp-recovery-for-oppo-n1</link>
		<comments>http://androidfannetwork.com/2013/11/23/root-and-twrp-recovery-for-oppo-n1/#comments</comments>
		<pubDate>Sat, 23 Nov 2013 07:02:32 +0000</pubDate>
		<dc:creator><![CDATA[Praneeth Kancherla]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Oppo N1]]></category>
		<category><![CDATA[root]]></category>
		<category><![CDATA[TWRP]]></category>

		<guid isPermaLink="false">http://androidfannetwork.com/?p=8700</guid>
		<description><![CDATA[<p>Root and TWRP recovery for Oppo N1 Oppo N1, the latest flagship Android smartphone from OPPO got working root method and TWRP recovery to flash custom ROMs or mods on your device. You can find prerequisites,  instructions on how to root,  root wizard &#38; ADB drivers download links from OPPO N1 sub forum on XDAdevelopers. ...<a class="post-readmore" href="/2013/11/23/root-and-twrp-recovery-for-oppo-n1/">read more</a></p><p>The post <a rel="nofollow" href="/2013/11/23/root-and-twrp-recovery-for-oppo-n1/">Root and TWRP recovery for Oppo N1</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></description>
				<content:encoded><![CDATA[<p style="text-align: center;"><a href="/wp-content/uploads/2013/11/AgsV.png"><img class="aligncenter size-full wp-image-8718" style="border: 0px;" alt="AgsV" src="/wp-content/uploads/2013/11/AgsV.png" width="240" height="400" /></a></p>
<p style="text-align: center;"><em><strong>Root and TWRP recovery for Oppo N1</strong></em></p>
<p>Oppo N1, the latest flagship Android smartphone from OPPO got working root method and TWRP recovery to flash custom ROMs or mods on your device.</p>
<p>You can find prerequisites,  instructions on how to root,  root wizard &amp; ADB drivers download links from <a href="http://forum.xda-developers.com/showthread.php?t=2536862" target="_blank">OPPO N1 sub forum on XDAdevelopers</a>. Make sure you enabled developer options and USB debugging on your device.</p>
<p>TWRP recovery can be flashed on your device by installing Goo Manager App from <a href="https://market.android.com/details?id=com.s0up.goomanager" target="_blank">Google PlayStore</a> or from <a href="http://goo.im/devs/s0updev/gooinsideme" target="_blank">here</a>.  You can also download recovery.img file from <a href="http://www.teamw.in/project/twrp2/209" target="_blank">Oppo N1 page on TWRP website here</a> without installing Goo Manager App.</p>
<p style="text-align: left;">Source : XDAdevelopers <a href="http://forum.xda-developers.com/showthread.php?t=2537080" target="_blank">here </a>&amp; <a href="http://forum.xda-developers.com/showthread.php?t=2536862" target="_blank">here</a></p>
<p>The post <a rel="nofollow" href="/2013/11/23/root-and-twrp-recovery-for-oppo-n1/">Root and TWRP recovery for Oppo N1</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://androidfannetwork.com/2013/11/23/root-and-twrp-recovery-for-oppo-n1/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>PSA: Kingo Root and Vroot Malicious</title>
		<link>http://androidfannetwork.com/2013/11/08/psa-kingo-root-and-vroot-malicious/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=psa-kingo-root-and-vroot-malicious</link>
		<comments>http://androidfannetwork.com/2013/11/08/psa-kingo-root-and-vroot-malicious/#comments</comments>
		<pubDate>Fri, 08 Nov 2013 14:38:40 +0000</pubDate>
		<dc:creator><![CDATA[Kevin Krueger]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[jcase]]></category>
		<category><![CDATA[kingo root]]></category>
		<category><![CDATA[root]]></category>
		<category><![CDATA[vroot]]></category>
		<category><![CDATA[xda]]></category>

		<guid isPermaLink="false">http://androidfannetwork.com/?p=7794</guid>
		<description><![CDATA[<p>If you were following a link to try rooting with Kingo root or VRoot stop now and look else where. Vroot pulls binaries from your PC and computer; the thread on XDA has been closed and links removed until it can be sorted out. Until this method is verified to be working safely and without ...<a class="post-readmore" href="/2013/11/08/psa-kingo-root-and-vroot-malicious/">read more</a></p><p>The post <a rel="nofollow" href="/2013/11/08/psa-kingo-root-and-vroot-malicious/">PSA: Kingo Root and Vroot Malicious</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>If you were following a link to try rooting with Kingo root or VRoot <span style="color: #ff0000;"><strong>stop now</strong></span><span style="color: #000000;"><strong> and look else where</strong></span>.</p>
<p><a href="https://twitter.com/TeamAndIRC/status/397767301811802112" target="_blank"><img class="aligncenter size-full wp-image-7809" alt="vroot-kingo-root" src="/wp-content/uploads/2013/11/vroot-kingo-root.png" width="481" height="291" /></a></p>
<p><a href="http://forum.xda-developers.com/showthread.php?t=2434453" target="_blank">Vroot</a> pulls binaries from your PC and computer; the <a href="http://forum.xda-developers.com/showpost.php?p=47111019&amp;postcount=65" target="_blank">thread on XDA has been closed</a> and links removed until it can be sorted out.</p>
<blockquote><p><em>Until this method is verified to be working safely and without malware, I would advise everyone not to use this method. This thread and any other are to be closed on sight. Please report them to the moderation team.</em></p></blockquote>
<p><a href="http://forum.xda-developers.com/showthread.php?t=2460745" target="_blank">Kingo Root</a> takes it a step further and sends your phone&#8217;s IMEI number to a server in China triggering the <a href="http://forum.xda-developers.com/showpost.php?p=47188994&amp;postcount=79" target="_blank">XDA thread</a> to be also be  closed down.</p>
<blockquote><p><em>Bumping this thread to clear some things up:</em></p>
<p><em>The tool isn&#8217;t allowed on the forums right now, we&#8217;re still working out some issues with them. Biggest issue being sending sensitive data unencrypted to their servers in China and grabbing the IMEI with no apparent reason. When that is solved the whole issue will be reassessed.</em></p>
<p><em><span style="color: red;"><b>Thread closed.</b></span> (for now)</em></p></blockquote>
<p>If you find other sources for these root methods please <em>be safe and steer clear</em> of them.</p>
<p>Big thanks to <a href="http://androidnews.co.in/2013/11/08/psa-use-kingo-root-vroot-root-android-device/" target="_blank">androidnews.co.in</a> for the alert.</p>
<p>The post <a rel="nofollow" href="/2013/11/08/psa-kingo-root-and-vroot-malicious/">PSA: Kingo Root and Vroot Malicious</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://androidfannetwork.com/2013/11/08/psa-kingo-root-and-vroot-malicious/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Android 4.4 build leaked for AT&amp;T Moto X</title>
		<link>http://androidfannetwork.com/2013/11/08/android-4-4-build-leaked-att-moto-x/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=android-4-4-build-leaked-att-moto-x</link>
		<comments>http://androidfannetwork.com/2013/11/08/android-4-4-build-leaked-att-moto-x/#comments</comments>
		<pubDate>Fri, 08 Nov 2013 13:02:12 +0000</pubDate>
		<dc:creator><![CDATA[Praneeth Kancherla]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Android 4.4 KitKat]]></category>
		<category><![CDATA[at&t]]></category>
		<category><![CDATA[moto x]]></category>
		<category><![CDATA[root]]></category>

		<guid isPermaLink="false">http://androidfannetwork.com/?p=7784</guid>
		<description><![CDATA[<p>  Android 4.4 build for AT&#38;T Motorola Moto X has leaked Two days back we reported on a leaked build for T-Mobile and it&#8217;s time for Moto X users on AT&#38;T to taste the Android 4.4 experience on their devices as a Android 4.4 build ( build id &#8211; 13.11.0Q2.X_44) has leaked. You can download the ...<a class="post-readmore" href="/2013/11/08/android-4-4-build-leaked-att-moto-x/">read more</a></p><p>The post <a rel="nofollow" href="/2013/11/08/android-4-4-build-leaked-att-moto-x/">Android 4.4 build leaked for AT&#038;T Moto X</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></description>
				<content:encoded><![CDATA[<p style="text-align: center;"><a href="/wp-content/uploads/2013/11/motox-story-gettoknow.png"><img class="aligncenter  wp-image-7785" style="border: 0px;" alt="motox-story-gettoknow" src="/wp-content/uploads/2013/11/motox-story-gettoknow.png" width="432" height="432" /></a></p>
<p style="text-align: center;">  <strong><em>Android 4.4 build for AT&amp;T Motorola Moto X has leaked</em></strong></p>
<p>Two days back we reported on a leaked build for T-Mobile and it&#8217;s time for Moto X users on AT&amp;T to taste the Android 4.4 experience on their devices as a Android 4.4 build ( build id &#8211; 13.11.0Q2.X_44) has leaked.</p>
<p>You can download the leaked build <a href="http://www.androidfilehost.com/?fid=23212708291675148" target="_blank">here</a>. Please be aware that flashing this build will update the bootloader and you will not be able to downgrade.</p>
<p><a href="https://twitter.com/TeamAndIRC/status/398686965865779200" target="_blank">jcase</a>, Well known developer has also got root functionality working on this build but it&#8217;s not released yet.</p>
<blockquote class="twitter-tweet" width="500"><p>and I have root on my at&amp;T motoX with 4.4, that was fun</p>
<p>&mdash; Justin Case (@TeamAndIRC) <a href="https://twitter.com/TeamAndIRC/statuses/398686965865779200">November 8, 2013</a></p></blockquote>
<p><script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>Here is build information lifted from rootzwiki.</p>
<blockquote>
<pre># begin build properties
# autogenerated by buildinfo.sh
ro.build.id=13.11.0Q2.X_44
ro.build.display.id=13.11.0Q2.X_44
ro.build.version.incremental=44
ro.build.version.sdk=19
ro.build.version.codename=REL
ro.build.version.release=4.4
ro.build.date=Mon Oct 21 08:42:31 PDT 2013
ro.build.date.utc=1382370151
ro.build.type=user
ro.build.user=dbbuild
ro.build.host=ca88lnxdroid14
ro.build.tags=bldacfg,release-keys
ro.product.model=XT1058
ro.product.brand=motorola
ro.product.name=ghost_att
ro.product.device=ghost
ro.product.board=MSM8960
ro.product.cpu.abi=armeabi-v7a
ro.product.cpu.abi2=armeabi
ro.product.manufacturer=motorola
ro.product.locale.language=en
ro.product.locale.region=US
ro.wifi.channels=
ro.board.platform=msm8960
# ro.build.product is obsolete; use ro.product.device
ro.build.product=ghost
# Do not try to parse ro.build.description or .fingerprint
ro.build.description=ghost_att-user 4.4 13.11.0Q2.X_44 44 bldacfg,release-keys
ro.build.fingerprint=motorola/ghost_att/ghost:4.4/13.11.0Q2.X_44/44:user/bldacfg,release-keys
ro.build.characteristics=nosdcard</pre>
</blockquote>
<p>Source : <a href="http://rootzwiki.com/topic/107721-att-moto-x-44-leak/" target="_blank">RootzWiki</a> and <a href="https://twitter.com/TeamAndIRC/status/398686965865779200" target="_blank">@jcase</a></p>
<p>The post <a rel="nofollow" href="/2013/11/08/android-4-4-build-leaked-att-moto-x/">Android 4.4 build leaked for AT&#038;T Moto X</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://androidfannetwork.com/2013/11/08/android-4-4-build-leaked-att-moto-x/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Verizon Galaxy S4 on I545VRUDMI1 Rooted</title>
		<link>http://androidfannetwork.com/2013/10/17/verizon-galaxy-s4-on-i545vrudmi1-rooted/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=verizon-galaxy-s4-on-i545vrudmi1-rooted</link>
		<comments>http://androidfannetwork.com/2013/10/17/verizon-galaxy-s4-on-i545vrudmi1-rooted/#comments</comments>
		<pubDate>Thu, 17 Oct 2013 12:16:14 +0000</pubDate>
		<dc:creator><![CDATA[munchy]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Galaxy S4]]></category>
		<category><![CDATA[I545VRUDMI1]]></category>
		<category><![CDATA[knox]]></category>
		<category><![CDATA[root]]></category>
		<category><![CDATA[Root de la Vega]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[verizon]]></category>

		<guid isPermaLink="false">http://androidfannetwork.com/?p=6722</guid>
		<description><![CDATA[<p>Verizon Samsung Galaxy S4 on I545VRUDMI1 has been rooted, all thanks to @designgears for Root de la Vega. The root method will completely wipe your phone but will NOT trip the Knox switch so your warranty won&#8217;t be voided. Click here for rooting instructions and download links.</p><p>The post <a rel="nofollow" href="/2013/10/17/verizon-galaxy-s4-on-i545vrudmi1-rooted/">Verizon Galaxy S4 on I545VRUDMI1 Rooted</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></description>
				<content:encoded><![CDATA[<p><a href="/wp-content/uploads/2013/06/samsung-galaxy-s-4-verizon-pr-1366323265.jpg"><img class="aligncenter size-medium wp-image-2484" alt="samsung-galaxy-s-4-verizon-pr-1366323265" src="/wp-content/uploads/2013/06/samsung-galaxy-s-4-verizon-pr-1366323265-300x218.jpg" width="300" height="218" /></a></p>
<p>Verizon Samsung Galaxy S4 on I545VRUDMI1 has been rooted, all thanks to @<a href="http://www.twitter.com/designgears" target="_blank">designgears</a> for Root de la Vega.</p>
<p>The root method will completely wipe your phone but will NOT trip the Knox switch so your warranty won&#8217;t be voided.</p>
<p>Click <a href="http://forum.xda-developers.com/showthread.php?t=2487142" target="_blank">here</a> for rooting instructions and download links.</p>
<p>The post <a rel="nofollow" href="/2013/10/17/verizon-galaxy-s4-on-i545vrudmi1-rooted/">Verizon Galaxy S4 on I545VRUDMI1 Rooted</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://androidfannetwork.com/2013/10/17/verizon-galaxy-s4-on-i545vrudmi1-rooted/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Root de la Vega : Root Verizon Galaxy Note 3</title>
		<link>http://androidfannetwork.com/2013/10/13/root-de-la-vega-root-verizon-galaxy-note-3/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=root-de-la-vega-root-verizon-galaxy-note-3</link>
		<comments>http://androidfannetwork.com/2013/10/13/root-de-la-vega-root-verizon-galaxy-note-3/#comments</comments>
		<pubDate>Sun, 13 Oct 2013 06:22:12 +0000</pubDate>
		<dc:creator><![CDATA[munchy]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[knox]]></category>
		<category><![CDATA[root]]></category>
		<category><![CDATA[Root de la Vega]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[SM-N900V]]></category>
		<category><![CDATA[verizon]]></category>

		<guid isPermaLink="false">http://androidfannetwork.com/?p=6539</guid>
		<description><![CDATA[<p>Despite Big Red locking down the bootloaders on Android devices the developers never say no, the Verizon Galaxy Note 3 has been rooted. Yes, we know bootloader is still locked but root is something which every Android tinkerer wants to have. Root de la Vega by @designgears is the tool which you can use to ...<a class="post-readmore" href="/2013/10/13/root-de-la-vega-root-verizon-galaxy-note-3/">read more</a></p><p>The post <a rel="nofollow" href="/2013/10/13/root-de-la-vega-root-verizon-galaxy-note-3/">Root de la Vega : Root Verizon Galaxy Note 3</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></description>
				<content:encoded><![CDATA[<p><a href="/wp-content/uploads/2013/10/BWbvNFRCMAA-pw_.jpg"><img class="aligncenter size-medium wp-image-6541" alt="BWbvNFRCMAA-pw_" src="/wp-content/uploads/2013/10/BWbvNFRCMAA-pw_-168x300.jpg" width="168" height="300" /></a></p>
<p>Despite Big Red locking down the bootloaders on Android devices the developers never say no, the Verizon Galaxy Note 3 has been rooted. Yes, we know bootloader is still locked but root is something which every Android tinkerer wants to have.</p>
<p>Root de la Vega by @<a href="http://www.twitter.com/designgears" target="_blank">designgears</a> is the tool which you can use to root your Verizon Galaxy Note 3, the instructions and download links on how to root Verizon Galaxy Note 3 can be found <a href="http://forum.xda-developers.com/showthread.php?t=2481590" target="_blank">here</a>. An important thing to note here is that the Knox flag will not be tripped which means your warranty will remain intact.</p>
<p>Happy rooting to all the Verizon Note 3 owners.</p>
<p>The post <a rel="nofollow" href="/2013/10/13/root-de-la-vega-root-verizon-galaxy-note-3/">Root de la Vega : Root Verizon Galaxy Note 3</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://androidfannetwork.com/2013/10/13/root-de-la-vega-root-verizon-galaxy-note-3/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>AT&amp;T Note 3 Root via Root de la Vega</title>
		<link>http://androidfannetwork.com/2013/10/07/att-note3-root-de-la-vega/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=att-note3-root-de-la-vega</link>
		<comments>http://androidfannetwork.com/2013/10/07/att-note3-root-de-la-vega/#comments</comments>
		<pubDate>Tue, 08 Oct 2013 02:07:23 +0000</pubDate>
		<dc:creator><![CDATA[munchy]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[at&t]]></category>
		<category><![CDATA[AT&T Note 3 Root]]></category>
		<category><![CDATA[galaxy note 3]]></category>
		<category><![CDATA[root]]></category>
		<category><![CDATA[Root de la Vega]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[SM-N900A]]></category>

		<guid isPermaLink="false">http://androidfannetwork.com/?p=6303</guid>
		<description><![CDATA[<p>Yes we all know by now that AT&#38;T sucks after it decided to start locking bootloaders, but even locking bootloaders has not stopped developers from hacking into AT&#38;T devices. The latest and arguably the  greatest Android phone, the Note 3 on AT&#38;T has been rooted. Yeps, the AT&#38;T Note 3 now has a write enabled ...<a class="post-readmore" href="/2013/10/07/att-note3-root-de-la-vega/">read more</a></p><p>The post <a rel="nofollow" href="/2013/10/07/att-note3-root-de-la-vega/">AT&#038;T Note 3 Root via Root de la Vega</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></description>
				<content:encoded><![CDATA[<p><a href="/wp-content/uploads/2013/10/note3root.png"><img class="aligncenter size-medium wp-image-6305" alt="note3root" src="/wp-content/uploads/2013/10/note3root-168x300.png" width="168" height="300" /></a></p>
<p>Yes we all know by now that AT&amp;T sucks after it decided to start locking bootloaders, but even locking bootloaders has not stopped developers from hacking into AT&amp;T devices. The latest and arguably the  greatest Android phone, the Note 3 on AT&amp;T has been rooted. Yeps, the AT&amp;T Note 3 now has a write enabled system partition.</p>
<p>The rooting method will wipe your data and internal sdcard as you need to downgrade to <span style="font-family: Franklin Gothic Medium;">N900AUCUBMI1</span>, don&#8217;t worry the downgrade is as easy as booting into download mode and then executing a file. Even though the rooting method has not tripped the knox counter in the tests conducted by the developers it may do so, proceed at your own risk. Click <a href="http://forum.xda-developers.com/showthread.php?t=2474422" target="_blank">here</a> to go the original thread for detailed instructions and download links.</p>
<p>Even though you don&#8217;t have a custom recovery yet for the AT&amp;T Note 3, now that you are rooted you can enjoy some Xposed mods.</p>
<p>The post <a rel="nofollow" href="/2013/10/07/att-note3-root-de-la-vega/">AT&#038;T Note 3 Root via Root de la Vega</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://androidfannetwork.com/2013/10/07/att-note3-root-de-la-vega/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Root Samsung Galaxy Note 3 (International, T-Mobile) Using CF Auto Root</title>
		<link>http://androidfannetwork.com/2013/10/02/root-samsung-galaxy-note-3-international-t-mobile-using-cf-auto-root/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=root-samsung-galaxy-note-3-international-t-mobile-using-cf-auto-root</link>
		<comments>http://androidfannetwork.com/2013/10/02/root-samsung-galaxy-note-3-international-t-mobile-using-cf-auto-root/#comments</comments>
		<pubDate>Wed, 02 Oct 2013 16:53:34 +0000</pubDate>
		<dc:creator><![CDATA[munchy]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[galaxy note 3]]></category>
		<category><![CDATA[n900]]></category>
		<category><![CDATA[n9005]]></category>
		<category><![CDATA[n900t]]></category>
		<category><![CDATA[root]]></category>
		<category><![CDATA[Root Samsung Galaxy Note 3]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[t mobile]]></category>

		<guid isPermaLink="false">http://androidfannetwork.com/?p=6088</guid>
		<description><![CDATA[<p>Samsung Galaxy Note 3 International &#38; T-Mobile version have been rooted by Chainfire CF Auto Root Utility. Below are the versions which are currently tested and reported working successfully:- SM-N900 (International Exynos) SM-N9005 (International Qualcomm) SM-N900T (T-Mobile US) To root you need to download the file for your Galaxy Note 3 listed here and flash ...<a class="post-readmore" href="/2013/10/02/root-samsung-galaxy-note-3-international-t-mobile-using-cf-auto-root/">read more</a></p><p>The post <a rel="nofollow" href="/2013/10/02/root-samsung-galaxy-note-3-international-t-mobile-using-cf-auto-root/">Root Samsung Galaxy Note 3 (International, T-Mobile) Using CF Auto Root</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></description>
				<content:encoded><![CDATA[<p><a href="/wp-content/uploads/2013/04/gotroot__03091.1262926081.600.600.jpg"><img class="aligncenter size-medium wp-image-622" alt="Motorola root" src="/wp-content/uploads/2013/04/gotroot__03091.1262926081.600.600-300x300.jpg" width="300" height="300" /></a></p>
<p>Samsung Galaxy Note 3 International &amp; T-Mobile version have been rooted by <a href="http://forum.xda-developers.com/member.php?u=631273" target="_blank">Chainfire</a> CF Auto Root Utility. Below are the versions which are currently tested and reported working successfully:-</p>
<ul>
<li>SM-N900 (International Exynos)</li>
<li>SM-N9005 (International Qualcomm)</li>
<li>SM-N900T (T-Mobile US)</li>
</ul>
<p>To root you need to download the file for your Galaxy Note 3 listed <a href="http://forum.xda-developers.com/showpost.php?p=46098951&amp;postcount=3" target="_blank">here</a> and flash the same using Odin. Please follow the instructions on how to flash the file using Odin <a href="http://forum.xda-developers.com/showpost.php?p=46098944&amp;postcount=2" target="_blank">here</a>. More details can be found <a href="http://forum.xda-developers.com/showthread.php?t=2466423" target="_blank">here</a>.</p>
<p><strong><span style="color: #ff0000;">Please note this will trip the flash counter on your Note 3 and your warranty will be voided. You have been warned. Happy Rooting.</span></strong></p>
<p>The post <a rel="nofollow" href="/2013/10/02/root-samsung-galaxy-note-3-international-t-mobile-using-cf-auto-root/">Root Samsung Galaxy Note 3 (International, T-Mobile) Using CF Auto Root</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://androidfannetwork.com/2013/10/02/root-samsung-galaxy-note-3-international-t-mobile-using-cf-auto-root/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Samsung Galaxy Note 3 Rooted</title>
		<link>http://androidfannetwork.com/2013/09/28/samsung-galaxy-note-3-rooted/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=samsung-galaxy-note-3-rooted</link>
		<comments>http://androidfannetwork.com/2013/09/28/samsung-galaxy-note-3-rooted/#comments</comments>
		<pubDate>Sat, 28 Sep 2013 14:08:32 +0000</pubDate>
		<dc:creator><![CDATA[munchy]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Clockworkmod]]></category>
		<category><![CDATA[cwm]]></category>
		<category><![CDATA[galaxy note 3]]></category>
		<category><![CDATA[root]]></category>
		<category><![CDATA[Samsung]]></category>

		<guid isPermaLink="false">http://androidfannetwork.com/?p=5883</guid>
		<description><![CDATA[<p>Samsung&#8217;s Galaxy Note 3 has been rooted. The root method is as simple as it gets. The pre-requsite is that you need to have clockwork mod recovery already installed. Once you have clockworkmod recovery installed on your Note 3 all you need to do is download this file and flash it from clockworkmod recovery. To ...<a class="post-readmore" href="/2013/09/28/samsung-galaxy-note-3-rooted/">read more</a></p><p>The post <a rel="nofollow" href="/2013/09/28/samsung-galaxy-note-3-rooted/">Samsung Galaxy Note 3 Rooted</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></description>
				<content:encoded><![CDATA[<p><a href="/wp-content/uploads/2013/09/1GALAXY-Note3_462x244_v2.jpg"><img class="aligncenter size-medium wp-image-5087" alt="[1]GALAXY Note3_462x244_v2" src="/wp-content/uploads/2013/09/1GALAXY-Note3_462x244_v2-300x158.jpg" width="300" height="158" /></a></p>
<p>Samsung&#8217;s Galaxy Note 3 has been rooted. The root method is as simple as it gets. The pre-requsite is that you need to have clockwork mod recovery already installed. Once you have clockworkmod recovery installed on your Note 3 all you need to do is download this <a href="http://download.chainfire.eu/351/SuperSU/UPDATE-SuperSU-v1.65.zip?retrieve_file=1" target="_blank">file</a> and flash it from clockworkmod recovery.</p>
<p>To download clockwork mod recovery for your Samsung Galaxy Note 3 head <a href="http://forum.xda-developers.com/showthread.php?t=2454079" target="_blank">here</a>.</p>
<p>The post <a rel="nofollow" href="/2013/09/28/samsung-galaxy-note-3-rooted/">Samsung Galaxy Note 3 Rooted</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://androidfannetwork.com/2013/09/28/samsung-galaxy-note-3-rooted/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Update Your Rooted Chromecast to Build 13300</title>
		<link>http://androidfannetwork.com/2013/09/22/update-your-rooted-chromecast-to-build-13300/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=update-your-rooted-chromecast-to-build-13300</link>
		<comments>http://androidfannetwork.com/2013/09/22/update-your-rooted-chromecast-to-build-13300/#comments</comments>
		<pubDate>Sun, 22 Sep 2013 10:13:17 +0000</pubDate>
		<dc:creator><![CDATA[munchy]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[build 13300]]></category>
		<category><![CDATA[chromecast]]></category>
		<category><![CDATA[flashcast]]></category>
		<category><![CDATA[root]]></category>

		<guid isPermaLink="false">http://androidfannetwork.com/?p=5685</guid>
		<description><![CDATA[<p>Chromecast was updated to build 13300 a few days ago, in case you are one of those who rooted your Chromecast and have not updated it ever since because you will loose root there is a solution for you to update to build 13300 without losing root. All you need is Flashcast and follow a ...<a class="post-readmore" href="/2013/09/22/update-your-rooted-chromecast-to-build-13300/">read more</a></p><p>The post <a rel="nofollow" href="/2013/09/22/update-your-rooted-chromecast-to-build-13300/">Update Your Rooted Chromecast to Build 13300</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></description>
				<content:encoded><![CDATA[<p><a href="/wp-content/uploads/2013/09/VaHvwVY.png"><img class="aligncenter size-full wp-image-5686" alt="VaHvwVY" src="/wp-content/uploads/2013/09/VaHvwVY.png" width="157" height="73" /></a></p>
<p>Chromecast was <a href="/2013/09/19/chromecast-getting-updated-to-build-13300/" target="_blank">updated to build 13300</a> a few days ago, in case you are one of those who rooted your Chromecast and have not updated it ever since because you will loose root there is a solution for you to update to build 13300 without losing root. All you need is <a href="http://forum.xda-developers.com/showthread.php?t=2452838" target="_blank">Flashcast</a> and follow a few simple instructions.</p>
<blockquote><p>FlashCast is a USB image that provides a standardized way to mod your Chromecast. Think of it like a recovery which runs off of a USB drive.</p></blockquote>
<p>What do you need:-</p>
<ul>
<li>A Chromecast with a vulnerable bootloader</li>
<li>The latest version of FlashCast</li>
<li>A USB drive (minimum size 128MB) which you are willing to have erased</li>
<li>A powered Micro-USB OTG cable</li>
</ul>
<p>Follow the instructions mentioned <a href="http://forum.xda-developers.com/showthread.php?t=2453097" target="_blank">here</a> and you will be on build 13300 on your Chromecast. Please note the modified build 13300 has OTA updates disabled.</p>
<p>The post <a rel="nofollow" href="/2013/09/22/update-your-rooted-chromecast-to-build-13300/">Update Your Rooted Chromecast to Build 13300</a> appeared first on <a rel="nofollow" href="/">Android Fan Network</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://androidfannetwork.com/2013/09/22/update-your-rooted-chromecast-to-build-13300/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
