Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
I uninstalled safestrap, wiped and reinstalled stock apps. Update downloaded from xda-developers failed after not finding some preinstalled apps (I think).
There was something about updating the su file and needing to do it manually for it to be successful.UPDATE:
Well, it appears that VooDoo RootKeeper did not actually work for me.
It acts like it did but whenever I try to actually do something that requires root it fails.
VooDoo says the device is rooted but it says it does not have root access.
Damn...
There are no apps listed in Superuser as allowed.
I'm guessing that has something to do with it.
Anybody know how to manually restore apps in the superuser list or know any specifics about Voodoo?
Thank you, thank you thank you wildkitten!!!
Your link got me to a post by SamuraiHL that led me to this post in xda by Frankie1588.
http://forum.xda-developers.com/showpost.php?p=40340941&postcount=14
The instructions there helped me fix root.
Mad props to wildkitten, SamuraiHL and Frankie1588!
Yeah, it's no biggie, I just hate Verizon trying to take away root possibilities from us. I had followed Samuri's instructions to the letter and had root before going to JB, but as you know, with this, there is no guarantee of success.That sucks wk. Hold out, something may be found, and apparently p3droid has sent Dan R a tweet or three about rooting the BIOIC, but officially Dan has retired from the rooting game....
Well, apparently Dan R, the one who found nearly all of Bionic's root exploits to date, is coming back to work on this one. The bad news for some, including me, is there will need to be Linux skills involved and won't be as nearly as simple as running HoB was.A few days and things might be looking up.
http://www.droidrzr.com/index.php/topic/16422-root-bounty-bionic-412-jb/#entry259339
That is good news. When he does find an exploit, chances are there will be others that can take that piece of knowledge and expand on it, making things easier for those of us (like myself) that are Linux ignorant.Well, apparently Dan R, the one who found nearly all of Bionic's root exploits to date, is coming back to work on this one. The bad news for some, including me, is there will need to be Linux skills involved and won't be as nearly as simple as running HoB was.
You may have run over all of this with Samurai already, but I have a question for you.Well, seems as if I will have to live without root. I tried doing that ADB Shell like Samuri went over with me, but I got a message he had never seen before. So, seems I am completely out of luck.
Nope, unfortunately not. Forgot what it brought up for me, but Samuri had said he had never seen the particular message I had got.You may have run over all of this with Samurai already, but I have a question for you.
You connect your phone in media mode, open a CMD shell (DOS prompt...) and run ADB.exe. The first command you send the phone is SU.
Does it then change the prompt to a # sign?
No, do not un-root and do not take the update yet. Did you ever have bionic bootstrap or safestrap installed?Am I understanding all this right? I have a Bionic...I'm stock rooted. I download the update file but it won't install. I have unfrozen everything but still can't get it to install. So....I have to unroot install the update file and then I can't be rooted anymore? If that's the case I'll just flash JB over to my phone and go from there.