- 04-05-2011, 03:56 PM #2
- 04-05-2011, 03:58 PM #3
you apply this to your phone and the exploit takes advantage of the security hole, you then move files into the system that later allow you super user access.
This is why hacking is called hacking and not cuddling.
If you want to root this is the how it works or you can use my odin packages in the stickies. the odin packages are pre rooted, the files are already in place.
- 04-05-2011, 04:04 PM #6
- 04-05-2011, 04:22 PM #8
- 04-05-2011, 05:00 PM #10
- 04-05-2011, 05:04 PM #11
- 04-05-2011, 09:57 PM #12
- 04-06-2011, 08:46 AM #13
- 04-06-2011, 10:36 AM #14
I had something similar to this happen to me last week.
I was psyching myself up to finally flash froyo on my phone, and I decided to get the ball rolling by downloading all of the necessary files to flash using Odin (I used the megaupload links found in the how-to thread). But when I got to the last file--odin itself--my Norton Internet Security identified it as a security risk, based on file reputation, and quarantined the download. It spooked me enough to keep me from moving forward with Froyo. I searched the forums for any sign that this happened to others, but found nothing.
Is this just Norton being paranoid?
Now I have Radiohead's "Paranoid Android" song stuck in my head. Great. lol.
- 04-06-2011, 11:01 AM #15
- 04-06-2011, 11:19 AM #16
Hmm, that certainly is a possibility. I just went to look at the logs in Norton, and from what they tell me, I can't tell for sure if that is what is going on. I'm attaching a screen capture of the log in case someone has some insights to share!
- 04-06-2011, 11:30 AM #17
WS.Reputation.1 is a detection for files that have a low reputation score based on analyzing data from Symantecís community of users and therefore are likely to be security risks. Detections of this type are based on Symantecís reputation-based security technology. Because this detection is based on a reputation score, it does not represent a specific class of threat like adware or spyware, but instead applies to all threat categories.
The reputation-based system uses "the wisdom of crowds" (Symantecís tens of millions of end users) connected to cloud-based intelligence to compute a reputation score for an application, and in the process identify malicious software in an entirely new way beyond traditional signatures and behavior-based detection techniques.
I just send you a PM try that one. if you get the error just ignore it
- 04-06-2011, 11:33 AM #18
- 04-06-2011, 11:34 AM #19
- 04-07-2011, 02:36 PM #20